INFO: Fri Oct 31 04:20:20 UTC 2025: BEGIN OpenShift CI mods INFO: Fri Oct 31 04:20:20 UTC 2025: Current Status: STABLE_MAIN_VERSION 4.10.x-207-g071f40eed6 STABLE_COLLECTOR_VERSION 3.23.x-8-gec8a0b3bd7 STABLE_FACT_VERSION 0.1.0 STABLE_SCANNER_VERSION 2.37.x-112-gde9f7c100e STABLE_GIT_SHORT_SHA 071f40eed6 fatal: no tag exactly matches '071f40eed6c12aa7633ccd3affa4fef509fdd572' Warning: Cannot get tag INFO: Fri Oct 31 04:20:23 UTC 2025: Status after mods: STABLE_MAIN_VERSION 4.10.x-207-g071f40eed6 STABLE_COLLECTOR_VERSION 3.23.x-8-gec8a0b3bd7 STABLE_FACT_VERSION 0.1.0 STABLE_SCANNER_VERSION 2.37.x-112-gde9f7c100e STABLE_GIT_SHORT_SHA 071f40eed6 INFO: Fri Oct 31 04:20:26 UTC 2025: END OpenShift CI mods INFO: Fri Oct 31 04:20:27 UTC 2025: Allow restricted SCC for all users and namespaces. clusterrolebinding.rbac.authorization.k8s.io/system:openshift:scc:restricted created **** **** 04:20:27: About to provision **** Using kubeconfig from /tmp/kubeconfig-2810687243 Nodes: NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 41m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 20m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 41m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 41m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 20m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 20m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 **** **** 04:20:27: provisioned **** **** **** 04:20:27: About to run initial pre test **** INFO: Fri Oct 31 04:20:28 UTC 2025: Record some cluster info parse error: Invalid numeric literal at line 26, column 8 INFO: Fri Oct 31 04:20:28 UTC 2025: Starting image pre-fetcher of pre-built images (NOT built for current commit)... + deploy go: downloading github.com/stackrox/image-prefetcher/deploy v0.3.0 INFO: Fri Oct 31 04:20:34 UTC 2025: Using /go/src/github.com/stackrox/stackrox/.gotools/bin/deploy v0.3.0 for image prefetch deployment make: Entering directory '/go/src/github.com/stackrox/stackrox/operator' echo '{ "apiVersion": "v1", "kind": "Namespace", "metadata": { "name": "prefetch-images" } }' | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh apply -f - namespace/prefetch-images created /go/src/github.com/stackrox/stackrox/operator//../deploy/common/pull-secret.sh stackrox quay.io | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh -n "prefetch-images" apply -f - Warning: providing passwords via (exported) environment variables is unsafe. secret/stackrox created make: Leaving directory '/go/src/github.com/stackrox/stackrox/operator' role.rbac.authorization.k8s.io/privileged-scc-use created rolebinding.rbac.authorization.k8s.io/prefetcher-privileged created deployment.apps/qa-e2e-metrics created service/qa-e2e-metrics created daemonset.apps/qa-e2e created configmap/qa-e2e created INFO: Fri Oct 31 04:20:35 UTC 2025: Image pre-fetcher is now running in the background. Its status will be checked later (look for message starting with Waiting for pre-fetcher). Proceeding with other tasks in the meantime. INFO: Fri Oct 31 04:20:36 UTC 2025: Polling for images required for system tests INFO: Fri Oct 31 04:20:36 UTC 2025: Will poll for: central-db main roxctl stackrox-operator stackrox-operator-bundle stackrox-operator-index INFO: Fri Oct 31 04:20:36 UTC 2025: Checking for central-db using https://quay.io/api/v1/repository/rhacs-eng/central-db/tag?specificTag=4.10.x-207-g071f40eed6 {"tags": [{"name": "4.10.x-207-g071f40eed6", "reversion": false, "start_ts": 1761874982, "manifest_digest": "sha256:e4d8fe55a3593caf4805ab49754d5e8689b79493b9aa70a353b333d0fe6000f4", "is_manifest_list": true, "size": null, "last_modified": "Fri, 31 Oct 2025 01:43:02 -0000"}], "page": 1, "has_additional": false} INFO: Fri Oct 31 04:20:37 UTC 2025: Checking for main using https://quay.io/api/v1/repository/rhacs-eng/main/tag?specificTag=4.10.x-207-g071f40eed6 {"tags": [{"name": "4.10.x-207-g071f40eed6", "reversion": false, "start_ts": 1761874743, "end_ts": 1769737143, "manifest_digest": "sha256:dd624d00106e0dcca7b6a6ae46deb3c9a4e80085b4bb8e2fe7a012f5407eff48", "is_manifest_list": true, "size": null, "last_modified": "Fri, 31 Oct 2025 01:39:03 -0000", "expiration": "Fri, 30 Jan 2026 01:39:03 -0000"}], "page": 1, "has_additional": false} INFO: Fri Oct 31 04:20:37 UTC 2025: Checking for roxctl using https://quay.io/api/v1/repository/rhacs-eng/roxctl/tag?specificTag=4.10.x-207-g071f40eed6 {"tags": [{"name": "4.10.x-207-g071f40eed6", "reversion": false, "start_ts": 1761874917, "end_ts": 1769737317, "manifest_digest": "sha256:57b3290e3a4a5058b9ee7b6cddf7955f23160decf5781ed41e3e4a7b1712230c", "is_manifest_list": true, "size": null, "last_modified": "Fri, 31 Oct 2025 01:41:57 -0000", "expiration": "Fri, 30 Jan 2026 01:41:57 -0000"}], "page": 1, "has_additional": false} INFO: Fri Oct 31 04:20:38 UTC 2025: Checking for stackrox-operator using https://quay.io/api/v1/repository/rhacs-eng/stackrox-operator/tag?specificTag=4.10.0-207-g071f40eed6 {"tags": [{"name": "4.10.0-207-g071f40eed6", "reversion": false, "start_ts": 1761874139, "manifest_digest": "sha256:e3ea2cf9226c1e9598650e007f5fc67f21e45cf70df02c7d5ce4b14fb2207772", "is_manifest_list": true, "size": null, "last_modified": "Fri, 31 Oct 2025 01:28:59 -0000"}], "page": 1, "has_additional": false} INFO: Fri Oct 31 04:20:39 UTC 2025: Checking for stackrox-operator-bundle using https://quay.io/api/v1/repository/rhacs-eng/stackrox-operator-bundle/tag?specificTag=v4.10.0-207-g071f40eed6 {"tags": [{"name": "v4.10.0-207-g071f40eed6", "reversion": false, "start_ts": 1761873612, "manifest_digest": "sha256:9be01daf21c3874e648fbde3dcb3fcbbad32eff3a0b32325f83946819da17b14", "is_manifest_list": false, "size": 46249, "last_modified": "Fri, 31 Oct 2025 01:20:12 -0000"}, {"name": "v4.10.0-207-g071f40eed6", "reversion": false, "start_ts": 1761873340, "end_ts": 1761873612, "manifest_digest": "sha256:dc57383f90bfcaf95a973a24df64897579c9bd26fbe5a33ceabf9d421478144a", "is_manifest_list": false, "size": 46254, "last_modified": "Fri, 31 Oct 2025 01:15:40 -0000", "expiration": "Fri, 31 Oct 2025 01:20:12 -0000"}], "page": 1, "has_additional": false} INFO: Fri Oct 31 04:20:40 UTC 2025: Checking for stackrox-operator-index using https://quay.io/api/v1/repository/rhacs-eng/stackrox-operator-index/tag?specificTag=v4.10.0-207-g071f40eed6 {"tags": [{"name": "v4.10.0-207-g071f40eed6", "reversion": false, "start_ts": 1761873639, "manifest_digest": "sha256:59e17346fc88cd72bd7479a1956d1115c02f0363b444af9f43ad2176d73b1d77", "is_manifest_list": false, "size": 20522494, "last_modified": "Fri, 31 Oct 2025 01:20:39 -0000"}, {"name": "v4.10.0-207-g071f40eed6", "reversion": false, "start_ts": 1761873367, "end_ts": 1761873639, "manifest_digest": "sha256:e0c1310750471b6bf49c7f88a934d1c224784c09659a4aefa38d526676affd09", "is_manifest_list": false, "size": 20522497, "last_modified": "Fri, 31 Oct 2025 01:16:07 -0000", "expiration": "Fri, 31 Oct 2025 01:20:39 -0000"}], "page": 1, "has_additional": false} INFO: Fri Oct 31 04:20:40 UTC 2025: All images exist. INFO: Fri Oct 31 04:20:40 UTC 2025: Starting image pre-fetcher of system images (built for current commit)... make: Nothing to be done for 'image-prefetcher-deploy-bin'. INFO: Fri Oct 31 04:20:41 UTC 2025: Using /go/src/github.com/stackrox/stackrox/.gotools/bin/deploy v0.3.0 for image prefetch deployment make: Entering directory '/go/src/github.com/stackrox/stackrox/operator' echo '{ "apiVersion": "v1", "kind": "Namespace", "metadata": { "name": "prefetch-images" } }' | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh apply -f - namespace/prefetch-images unchanged /go/src/github.com/stackrox/stackrox/operator//../deploy/common/pull-secret.sh stackrox quay.io | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh -n "prefetch-images" apply -f - Warning: providing passwords via (exported) environment variables is unsafe. secret/stackrox unchanged make: Leaving directory '/go/src/github.com/stackrox/stackrox/operator' role.rbac.authorization.k8s.io/privileged-scc-use unchanged rolebinding.rbac.authorization.k8s.io/prefetcher-privileged unchanged deployment.apps/stackrox-images-metrics created service/stackrox-images-metrics created daemonset.apps/stackrox-images created configmap/stackrox-images created INFO: Fri Oct 31 04:20:43 UTC 2025: Image pre-fetcher is now running in the background. Its status will be checked later (look for message starting with Waiting for pre-fetcher). Proceeding with other tasks in the meantime. **** **** 04:20:43: initial pre test completed **** **** **** 04:20:43: About to run [QA tests part I] **** **** **** 04:20:43: About to run pre test [QA tests part I] **** **** **** 04:20:43: pre test completed [QA tests part I] **** **** **** 04:20:43: About to run test [QA tests part I] **** Executing qa-tests-backend tests (part I) INFO: Fri Oct 31 04:20:43 UTC 2025: Starting test (qa-tests-backend part I) INFO: Fri Oct 31 04:20:43 UTC 2025: Configuring the cluster to run part 1 of e2e tests INFO: Fri Oct 31 04:20:44 UTC 2025: Setting up GCP auth and config Activated service account credentials for: [stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com] Credentialed Accounts ACTIVE ACCOUNT * stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com To set the active account, run: $ gcloud config set account `ACCOUNT` Updated property [core/project]. Updated property [compute/region]. Unset property [compute/zone]. Updated property [core/disable_prompts]. INFO: Fri Oct 31 04:20:49 UTC 2025: Setting up the deployment environment INFO: Fri Oct 31 04:20:50 UTC 2025: Set POD_SECURITY_POLICIES variable based on kubernetes version INFO: Fri Oct 31 04:20:50 UTC 2025: POD_SECURITY_POLICIES set to false INFO: Fri Oct 31 04:20:50 UTC 2025: Will remove any existing stackrox resources INFO: Fri Oct 31 04:20:50 UTC 2025: Tearing down StackRox resources for namespaces stackrox... out: No resources found out: Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "securitypolicies.config.stackrox.io" not found INFO: Fri Oct 31 04:20:52 UTC 2025: Finished tearing down resources. INFO: Fri Oct 31 04:20:52 UTC 2025: Setting up default certs for tests /go/src/github.com/stackrox/stackrox/deploy/openshift/default_TLS_certs /go/src/github.com/stackrox/stackrox ----- Certificate request self-signature ok subject=CN=Intermediate Server CA Certificate request self-signature ok subject=CN=custom-tls-cert.central.stackrox.local /go/src/github.com/stackrox/stackrox Contents of /go/src/github.com/stackrox/stackrox/deploy/openshift/default_TLS_certs: total 56 drwx------. 2 1001050000 root 4096 Oct 31 04:20 . drwxrwxr-x. 1 root root 31 Oct 31 04:20 .. -rw-r--r--. 1 1001050000 root 1082 Oct 31 04:20 ca.crt -rw-------. 1 1001050000 root 1704 Oct 31 04:20 ca.key -rw-r--r--. 1 1001050000 root 41 Oct 31 04:20 ca.srl -rw-r--r--. 1 1001050000 root 1509 Oct 31 04:20 intermediate.crt -rw-------. 1 1001050000 root 3272 Oct 31 04:20 intermediate.key -rw-r--r--. 1 1001050000 root 41 Oct 31 04:20 intermediate.srl -rw-------. 1 1001050000 root 6211 Oct 31 04:20 keystore.p12 -rw-r--r--. 1 1001050000 root 1911 Oct 31 04:20 leaf.crt -rw-------. 1 1001050000 root 3272 Oct 31 04:20 leaf.key -rw-r--r--. 1 1001050000 root 4502 Oct 31 04:20 tls.crt -rw-------. 1 1001050000 root 3272 Oct 31 04:20 tls.key INFO: Fri Oct 31 04:20:52 UTC 2025: Waiting for pre-fetcher of system images to complete... INFO: Fri Oct 31 04:20:52 UTC 2025: Waiting for image prefetcher set stackrox-images to complete... Waiting for daemon set "stackrox-images" rollout to finish: 0 of 6 updated pods are available... Waiting for daemon set "stackrox-images" rollout to finish: 1 of 6 updated pods are available... Waiting for daemon set "stackrox-images" rollout to finish: 2 of 6 updated pods are available... Waiting for daemon set "stackrox-images" rollout to finish: 3 of 6 updated pods are available... Waiting for daemon set "stackrox-images" rollout to finish: 4 of 6 updated pods are available... Waiting for daemon set "stackrox-images" rollout to finish: 5 of 6 updated pods are available... daemon set "stackrox-images" successfully rolled out INFO: Fri Oct 31 04:23:27 UTC 2025: All images in the set are now pre-fetched. INFO: Fri Oct 31 04:23:27 UTC 2025: Now retrieving prefetcher metrics... INFO: Fri Oct 31 04:23:27 UTC 2025: Saving Big Query test records from /tmp/tmp.BT4oHm83Sb.csv to gs://stackrox-ci-artifacts/image-prefetches-metrics/upload Copying file:///tmp/tmp.BT4oHm83Sb.csv to gs://stackrox-ci-artifacts/image-prefetches-metrics/upload/tmp.BT4oHm83Sb.csv .. INFO: Fri Oct 31 04:23:29 UTC 2025: Image pre-fetcher metrics retrieved and saved. INFO: Fri Oct 31 04:23:29 UTC 2025: About to deploy StackRox (Central + Sensor). INFO: Fri Oct 31 04:23:29 UTC 2025: Set POD_SECURITY_POLICIES variable based on kubernetes version INFO: Fri Oct 31 04:23:29 UTC 2025: POD_SECURITY_POLICIES set to false INFO: Fri Oct 31 04:23:29 UTC 2025: Deploying ACS operator make: Entering directory '/go/src/github.com/stackrox/stackrox/operator' + kubectl-kuttl go: downloading github.com/kudobuilder/kuttl v0.22.0 go: downloading github.com/spf13/cobra v1.9.1 go: downloading k8s.io/apimachinery v0.32.2 go: downloading k8s.io/api v0.32.2 go: downloading github.com/spf13/pflag v1.0.6 go: downloading k8s.io/apiextensions-apiserver v0.32.2 go: downloading k8s.io/client-go v0.32.2 go: downloading sigs.k8s.io/controller-runtime v0.20.2 go: downloading github.com/docker/docker v27.5.1+incompatible go: downloading github.com/Masterminds/semver/v3 v3.3.1 go: downloading github.com/dustinkirkland/golang-petname v0.0.0-20191129215211-8e5a1ed0cff0 go: downloading github.com/google/cel-go v0.23.2 go: downloading github.com/thoas/go-funk v0.9.3 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading sigs.k8s.io/kind v0.27.0 go: downloading k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738 go: downloading github.com/google/gofuzz v1.2.0 go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.4.2 go: downloading sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 go: downloading sigs.k8s.io/yaml v1.4.0 go: downloading github.com/evanphx/json-patch/v5 v5.9.11 go: downloading cel.dev/expr v0.19.1 go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20240826202546-f6391c0de4c7 go: downloading google.golang.org/protobuf v1.36.1 go: downloading github.com/go-logr/logr v1.4.2 go: downloading golang.org/x/net v0.38.0 go: downloading k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f go: downloading golang.org/x/sys v0.31.0 go: downloading github.com/stoewer/go-strcase v1.3.0 go: downloading github.com/antlr4-go/antlr/v4 v4.13.0 go: downloading github.com/golang/protobuf v1.5.4 go: downloading github.com/google/gnostic-models v0.6.8 go: downloading golang.org/x/term v0.30.0 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20240826202546-f6391c0de4c7 go: downloading al.essio.dev/pkg/shellescape v1.5.1 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading golang.org/x/time v0.7.0 go: downloading github.com/docker/go-connections v0.4.0 go: downloading github.com/opencontainers/image-spec v1.0.2 go: downloading go.opentelemetry.io/otel/trace v1.28.0 go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.53.0 go: downloading github.com/go-openapi/jsonreference v0.20.2 go: downloading github.com/go-openapi/swag v0.23.0 go: downloading golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 go: downloading go.opentelemetry.io/otel v1.28.0 go: downloading github.com/google/go-cmp v0.6.0 go: downloading golang.org/x/oauth2 v0.27.0 go: downloading github.com/google/safetext v0.0.0-20220905092116-b49f7bc46da2 go: downloading github.com/docker/go-units v0.4.0 go: downloading github.com/moby/docker-image-spec v1.3.1 go: downloading golang.org/x/text v0.23.0 go: downloading github.com/BurntSushi/toml v1.4.0 go: downloading github.com/emicklei/go-restful/v3 v3.11.0 go: downloading github.com/mailru/easyjson v0.7.7 go: downloading go.opentelemetry.io/otel/metric v1.28.0 KUTTL=/go/src/github.com/stackrox/stackrox/operator/.gotools/bin/kubectl-kuttl PATH="/go/src/github.com/stackrox/stackrox/operator//hack:${PATH}" ./hack/olm-operator-install.sh stackrox-operator quay.io/rhacs-eng/stackrox-operator-index v4.10.0-207-g071f40eed6 v4.10.0-207-g071f40eed6 latest 2025-10-31T04:23:50Z Creating namespace... namespace/stackrox-operator created 2025-10-31T04:23:50Z Applying operator manifests... catalogsource.operators.coreos.com/stackrox-operator-test-index created operatorgroup.operators.coreos.com/all-namespaces-operator-group created subscription.operators.coreos.com/stackrox-operator-test-subscription created 2025-10-31T04:23:51Z Waiting for an install plan to be created subscription.operators.coreos.com/stackrox-operator-test-subscription condition met 2025-10-31T04:24:20Z Verifying that the subscription is progressing to the expected CSV of v4.10.0-207-g071f40eed6... 2025-10-31T04:24:21Z Approving install plan install-f6zjs installplan.operators.coreos.com/install-f6zjs patched 2025-10-31T04:24:21Z Waiting for the v4.10.0-207-g071f40eed6 CSV to finish installing. assert is valid 2025-10-31T04:24:48Z Making sure the v4.10.0-207-g071f40eed6 operator deployment is available... deployment.apps/rhacs-operator-controller-manager condition met make: Leaving directory '/go/src/github.com/stackrox/stackrox/operator' INFO: Fri Oct 31 04:24:49 UTC 2025: Deploying central to namespace stackrox This does not appear to be a PR context INFO: Fri Oct 31 04:24:49 UTC 2025: Warning: checking for a label in a non PR context: details: { "msg": "this is not a PR" }, exitstatus: 1 This does not appear to be a PR context INFO: Fri Oct 31 04:24:49 UTC 2025: Warning: checking for a label in a non PR context: details: { "msg": "this is not a PR" }, exitstatus: 1 INFO: Fri Oct 31 04:24:49 UTC 2025: Deploying central via operator into namespace stackrox namespace/stackrox created make: Entering directory '/go/src/github.com/stackrox/stackrox/operator' echo '{ "apiVersion": "v1", "kind": "Namespace", "metadata": { "name": "stackrox" } }' | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh apply -f - namespace/stackrox configured Warning: resource namespaces/stackrox is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. /go/src/github.com/stackrox/stackrox/operator//../deploy/common/pull-secret.sh stackrox quay.io | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh -n "stackrox" apply -f - Warning: providing passwords via (exported) environment variables is unsafe. secret/stackrox created make: Leaving directory '/go/src/github.com/stackrox/stackrox/operator' central.platform.stackrox.io/stackrox-central-services created secret/central-admin-pass created secret/central-default-tls-secret created INFO: Fri Oct 31 04:24:50 UTC 2025: Waiting for stackrox deploy/central to appear INFO: Fri Oct 31 04:25:10 UTC 2025: Waiting for stackrox deploy/central to appear INFO: Fri Oct 31 04:25:30 UTC 2025: Using existing ROX_ADMIN_PASSWORD env INFO: Fri Oct 31 04:25:30 UTC 2025: Waiting for Central to be ready in namespace stackrox INFO: Fri Oct 31 04:25:30 UTC 2025: Waiting 600s (increased for openshift-ci provisioned clusters) for central api and 3600 for ingress... INFO: Fri Oct 31 04:25:30 UTC 2025: Waiting for deployment central to be ready in namespace stackrox INFO: Fri Oct 31 04:25:30 UTC 2025: Still waiting (0s/600s)... INFO: Fri Oct 31 04:25:36 UTC 2025: Still waiting (6s/600s)... INFO: Fri Oct 31 04:25:41 UTC 2025: Still waiting (11s/600s)... INFO: Fri Oct 31 04:25:46 UTC 2025: Still waiting (16s/600s)... INFO: Fri Oct 31 04:25:51 UTC 2025: Still waiting (21s/600s)... INFO: Fri Oct 31 04:26:06 UTC 2025: Deployment central is ready in namespace stackrox. INFO: Fri Oct 31 04:26:06 UTC 2025: Central deployment is ready in namespace stackrox. INFO: Fri Oct 31 04:26:06 UTC 2025: Waiting for Central API endpoint INFO: Fri Oct 31 04:26:06 UTC 2025: Found ingress endpoint: a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com INFO: Fri Oct 31 04:26:06 UTC 2025: Attempting to get 6 'ok' responses in a row from https://a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com:443/v1/ping INFO: Fri Oct 31 04:26:06 UTC 2025: Curl exited with status 6 and returned ''. INFO: Fri Oct 31 04:26:11 UTC 2025: Curl exited with status 6 and returned ''. INFO: Fri Oct 31 04:26:16 UTC 2025: Curl exited with status 6 and returned ''. INFO: Fri Oct 31 04:26:21 UTC 2025: Curl exited with status 6 and returned ''. INFO: Fri Oct 31 04:26:26 UTC 2025: Curl exited with status 35 and returned ''. INFO: Fri Oct 31 04:26:31 UTC 2025: Status is now: ok INFO: Fri Oct 31 04:26:33 UTC 2025: Status is now: ok INFO: Fri Oct 31 04:26:36 UTC 2025: Status is now: ok INFO: Fri Oct 31 04:26:38 UTC 2025: Status is now: ok INFO: Fri Oct 31 04:26:40 UTC 2025: Curl exited with status 6 and returned ''. INFO: Fri Oct 31 04:26:46 UTC 2025: Status is now: ok INFO: Fri Oct 31 04:26:48 UTC 2025: Status is now: ok INFO: Fri Oct 31 04:26:50 UTC 2025: Curl exited with status 6 and returned ''. INFO: Fri Oct 31 04:26:55 UTC 2025: Status is now: ok INFO: Fri Oct 31 04:26:57 UTC 2025: Status is now: ok INFO: Fri Oct 31 04:26:59 UTC 2025: Curl exited with status 6 and returned ''. INFO: Fri Oct 31 04:27:04 UTC 2025: Status is now: ok INFO: Fri Oct 31 04:27:06 UTC 2025: Status is now: ok INFO: Fri Oct 31 04:27:08 UTC 2025: Status is now: ok INFO: Fri Oct 31 04:27:10 UTC 2025: Status is now: ok INFO: Fri Oct 31 04:27:12 UTC 2025: Status is now: ok INFO: Fri Oct 31 04:27:15 UTC 2025: Setting up client certs for tests /go/src/github.com/stackrox/stackrox/deploy/openshift/client_TLS_certs /go/src/github.com/stackrox/stackrox ----- Certificate request self-signature ok subject=CN=Intermediate Client CA Certificate request self-signature ok subject=CN=Client Certificate User /go/src/github.com/stackrox/stackrox Contents of /go/src/github.com/stackrox/stackrox/deploy/openshift/client_TLS_certs: total 56 drwx------. 2 1001050000 root 4096 Oct 31 04:27 . drwxrwxr-x. 1 root root 55 Oct 31 04:27 .. -rw-r--r--. 1 1001050000 root 1082 Oct 31 04:27 ca.crt -rw-------. 1 1001050000 root 1704 Oct 31 04:27 ca.key -rw-r--r--. 1 1001050000 root 41 Oct 31 04:27 ca.srl -rw-r--r--. 1 1001050000 root 1509 Oct 31 04:27 intermediate.crt -rw-------. 1 1001050000 root 3272 Oct 31 04:27 intermediate.key -rw-r--r--. 1 1001050000 root 41 Oct 31 04:27 intermediate.srl -rw-------. 1 1001050000 root 6179 Oct 31 04:27 keystore.p12 -rw-r--r--. 1 1001050000 root 1870 Oct 31 04:27 leaf.crt -rw-------. 1 1001050000 root 3272 Oct 31 04:27 leaf.key -rw-r--r--. 1 1001050000 root 4461 Oct 31 04:27 tls.crt -rw-------. 1 1001050000 root 3272 Oct 31 04:27 tls.key INFO: Fri Oct 31 04:27:16 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json INFO: Fri Oct 31 04:27:16 UTC 2025: Deploying sensor into namespace stackrox (central is expected in namespace stackrox) INFO: Fri Oct 31 04:27:17 UTC 2025: Deploying sensor via operator into namespace stackrox (central is expected in namespace stackrox) make: Entering directory '/go/src/github.com/stackrox/stackrox/operator' echo '{ "apiVersion": "v1", "kind": "Namespace", "metadata": { "name": "stackrox" } }' | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh apply -f - namespace/stackrox unchanged /go/src/github.com/stackrox/stackrox/operator//../deploy/common/pull-secret.sh stackrox quay.io | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh -n "stackrox" apply -f - Warning: providing passwords via (exported) environment variables is unsafe. secret/stackrox unchanged make: Leaving directory '/go/src/github.com/stackrox/stackrox/operator' INFO: Successfully generated new init bundle. Name: my-test-bundle Created at: seconds:1761884838 nanos:149681517 Expires at: seconds:1793420820 Created By: admin ID: 1a9f31e5-7aed-4367-89eb-2dc3ea68d460 INFO: The init bundle needs to be stored securely, since it contains secrets. INFO: It is not possible to retrieve previously generated init bundles. secret/collector-tls created secret/sensor-tls created secret/admission-control-tls created Overriding the product default collection method due to COLLECTION_METHOD variable: core_bpf securedcluster.platform.stackrox.io/stackrox-secured-cluster-services created INFO: Fri Oct 31 04:27:18 UTC 2025: Waiting for stackrox deploy/sensor to appear daemonset.apps/collector env updated Sensor deployed. Waiting for sensor to be up Waiting for sensor to start in namespace stackrox Sensor replicas: 1 Sensor readyReplicas: null Sensor is running NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE collector 6 6 6 0 6 17s Waiting for collectors to start Collectors are running pod "collector-87847" deleted pod "collector-dk8b6" deleted pod "collector-dzlhx" deleted pod "collector-k92md" deleted pod "collector-rx7ns" deleted pod "collector-ssbx9" deleted Waiting for sensor to start in namespace stackrox Sensor is running NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE collector 6 6 3 6 3 40s Waiting for collectors to start Desired collectors: 6 Ready collectors: 3 Collectors are running INFO: Fri Oct 31 04:28:23 UTC 2025: Will wait for collectors to reach a ready state in namespace stackrox daemon set "collector" successfully rolled out Checking readiness of collector-cmgmb collector-cmgmb is deemed ready Checking readiness of collector-dnv9p collector-dnv9p is deemed ready Checking readiness of collector-nhmnm collector-nhmnm is deemed ready Checking readiness of collector-pj5kz collector-pj5kz is deemed ready Checking readiness of collector-s9bvx collector-s9bvx is deemed ready Checking readiness of collector-v2g62 collector-v2g62 is deemed ready central.platform.stackrox.io/stackrox-central-services annotated securedcluster.platform.stackrox.io/stackrox-secured-cluster-services annotated INFO: Fri Oct 31 04:28:25 UTC 2025: Installing optional components used in E2E tests INFO: Fri Oct 31 04:28:25 UTC 2025: Skipping the compliance operator install INFO: Fri Oct 31 04:28:25 UTC 2025: Skipping the workload identity setup. INFO: Fri Oct 31 04:28:25 UTC 2025: Deploy Default PSP for stackrox namespace INFO: Fri Oct 31 04:28:25 UTC 2025: POD_SECURITY_POLICIES is false, skip Deploy Default PSP for stackrox namespace INFO: Fri Oct 31 04:28:25 UTC 2025: Deploy Webhook server /go/src/github.com/stackrox/stackrox/deploy/openshift/webhook_server_certs /go/src/github.com/stackrox/stackrox ----- Certificate request self-signature ok subject=CN=Intermediate Webhook Server CA Certificate request self-signature ok subject=CN=webhookserver.stackrox /go/src/github.com/stackrox/stackrox /go/src/github.com/stackrox/stackrox/webhookserver /go/src/github.com/stackrox/stackrox Release "webhookserver" does not exist. Installing it now. NAME: webhookserver LAST DEPLOYED: Fri Oct 31 04:28:26 2025 NAMESPACE: stackrox STATUS: deployed REVISION: 1 TEST SUITE: None /go/src/github.com/stackrox/stackrox Waiting for deployment "webhookserver" rollout to finish: 0 of 1 updated replicas are available... deployment "webhookserver" successfully rolled out INFO: Fri Oct 31 04:28:41 UTC 2025: Get AWS ECR Docker Pull Password aws-cli/2.7.17 Python/3.9.11 Linux/5.14.0-570.54.1.el9_6.x86_64 exe/x86_64.centos.9 prompt/off INFO: Fri Oct 31 04:28:43 UTC 2025: Waiting for pre-fetcher of pre-built images to complete... INFO: Fri Oct 31 04:28:43 UTC 2025: Waiting for image prefetcher set qa-e2e to complete... daemon set "qa-e2e" successfully rolled out INFO: Fri Oct 31 04:28:43 UTC 2025: All images in the set are now pre-fetched. INFO: Fri Oct 31 04:28:43 UTC 2025: Now retrieving prefetcher metrics... INFO: Fri Oct 31 04:28:43 UTC 2025: Saving Big Query test records from /tmp/tmp.B4neo7nFu7.csv to gs://stackrox-ci-artifacts/image-prefetches-metrics/upload Copying file:///tmp/tmp.B4neo7nFu7.csv to gs://stackrox-ci-artifacts/image-prefetches-metrics/upload/tmp.B4neo7nFu7.csv .. INFO: Fri Oct 31 04:28:45 UTC 2025: Image pre-fetcher metrics retrieved and saved. INFO: Fri Oct 31 04:28:45 UTC 2025: QA Automation Platform Part 1 Error from server (NotFound): securitycontextconstraints.security.openshift.io "qatest-anyuid" not found securitycontextconstraints.security.openshift.io/qatest-anyuid created INFO: Fri Oct 31 04:28:45 UTC 2025: Running all QA tests by default... INFO: Fri Oct 31 04:28:45 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json make: Entering directory '/go/src/github.com/stackrox/stackrox/qa-tests-backend' + copy scanner protos rm -rf src/main/proto/scanner + build/generated TEST_TARGET="build/generated" ./gradlew generateProto generateTestProto Downloading https://services.gradle.org/distributions/gradle-8.13-bin.zip .............10%.............20%.............30%.............40%.............50%.............60%.............70%.............80%.............90%.............100% Welcome to Gradle 8.13! Here are the highlights of this release: - Daemon JVM auto-provisioning - Enhancements for Scala plugin and JUnit testing - Improvements for build authors and plugin developers For more details see https://docs.gradle.org/8.13/release-notes.html Starting a Gradle Daemon (subsequent builds will be faster) Type-safe project accessors is an incubating feature. > Task :annotations:compileJava NO-SOURCE > Task :annotations:compileGroovy Couldn't create user preferences directory. User preferences are unusable. java.io.IOException: No such file or directory > Task :annotations:processResources NO-SOURCE > Task :annotations:classes > Task :annotations:jar > Task :extractIncludeProto > Task :extractProto > Task :generateProto Could not lock User prefs. Unix error code 2. Couldn't flush user prefs: java.util.prefs.BackingStoreException: Couldn't get file lock. > Task :compileJava Note: Some input files use or override a deprecated API. Note: Recompile with -Xlint:deprecation for details. Could not lock User prefs. Unix error code 2. Couldn't flush user prefs: java.util.prefs.BackingStoreException: Couldn't get file lock. Could not lock User prefs. Unix error code 2. Couldn't flush user prefs: java.util.prefs.BackingStoreException: Couldn't get file lock. Could not lock User prefs. Unix error code 2. Couldn't flush user prefs: java.util.prefs.BackingStoreException: Couldn't get file lock. > Task :compileGroovy > Task :processResources > Task :classes > Task :extractIncludeTestProto > Task :extractTestProto > Task :generateTestProto NO-SOURCE [Incubating] Problems report is available at: file:///go/src/github.com/stackrox/stackrox/qa-tests-backend/build/reports/problems/problems-report.html Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0. You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins. For more on this, please refer to https://docs.gradle.org/8.13/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation. BUILD SUCCESSFUL in 2m 52s 10 actionable tasks: 10 executed + compile Type-safe project accessors is an incubating feature. > Task :annotations:compileJava NO-SOURCE > Task :annotations:compileGroovy UP-TO-DATE > Task :annotations:processResources NO-SOURCE > Task :annotations:classes UP-TO-DATE > Task :annotations:jar UP-TO-DATE > Task :extractIncludeProto UP-TO-DATE > Task :extractProto UP-TO-DATE > Task :generateProto UP-TO-DATE > Task :compileJava UP-TO-DATE > Task :compileGroovy UP-TO-DATE > Task :processResources UP-TO-DATE > Task :classes UP-TO-DATE > Task :jar > Task :assemble > Task :annotations:assemble UP-TO-DATE > Task :extractIncludeTestProto UP-TO-DATE > Task :extractTestProto UP-TO-DATE > Task :generateTestProto NO-SOURCE > Task :compileTestJava NO-SOURCE > Task :compileTestGroovy Couldn't create user preferences directory. User preferences are unusable. java.io.IOException: No such file or directory > Task :processTestResources > Task :testClasses > Task :annotations:compileTestJava NO-SOURCE > Task :annotations:compileTestGroovy NO-SOURCE > Task :annotations:processTestResources NO-SOURCE > Task :annotations:testClasses UP-TO-DATE [Incubating] Problems report is available at: file:///go/src/github.com/stackrox/stackrox/qa-tests-backend/build/reports/problems/problems-report.html Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0. You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins. For more on this, please refer to https://docs.gradle.org/8.13/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation. BUILD SUCCESSFUL in 14s 13 actionable tasks: 3 executed, 10 up-to-date + test TEST_TARGET="test" ./gradlew testBegin testParallel testRest Type-safe project accessors is an incubating feature. > Task :annotations:compileJava NO-SOURCE > Task :annotations:compileGroovy UP-TO-DATE > Task :annotations:processResources NO-SOURCE > Task :annotations:classes UP-TO-DATE > Task :annotations:jar UP-TO-DATE > Task :extractIncludeProto UP-TO-DATE > Task :extractProto UP-TO-DATE > Task :generateProto UP-TO-DATE > Task :compileJava UP-TO-DATE > Task :compileGroovy UP-TO-DATE > Task :processResources UP-TO-DATE > Task :classes UP-TO-DATE > Task :extractIncludeTestProto UP-TO-DATE > Task :extractTestProto UP-TO-DATE > Task :generateTestProto NO-SOURCE > Task :compileTestJava NO-SOURCE > Task :compileTestGroovy UP-TO-DATE > Task :processTestResources UP-TO-DATE > Task :testClasses UP-TO-DATE > Task :testBegin VulnMgmtSACTest STANDARD_OUT 04:32:01 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Starting testsuite 04:32:01 | INFO | VulnMgmtSACTest | BaseSpecification | Performing global setup 04:32:01 | DEBUG | VulnMgmtSACTest | Kubernetes | quay: secret created. 04:32:01 | DEBUG | VulnMgmtSACTest | Kubernetes | public-dockerhub: secret created. 04:32:01 | DEBUG | VulnMgmtSACTest | Kubernetes | gcr-image-pull-secret: secret created. 04:32:02 | DEBUG | VulnMgmtSACTest | Kubernetes | redhat-image-pull-secret: secret created. 04:32:02 | DEBUG | VulnMgmtSACTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:32:02 | INFO | VulnMgmtSACTest | BaseSpecification | Testing against: 04:32:02 | INFO | VulnMgmtSACTest | BaseSpecification | version: "4.10.x-207-g071f40eed6" build_flavor: "development" license_status: VALID 04:32:02 | INFO | VulnMgmtSACTest | BaseSpecification | isGKE: false 04:32:02 | INFO | VulnMgmtSACTest | BaseSpecification | isEKS: false 04:32:02 | INFO | VulnMgmtSACTest | BaseSpecification | isOpenShift4: true 04:32:02 | INFO | VulnMgmtSACTest | BaseSpecification | testTarget: test 04:32:03 | INFO | VulnMgmtSACTest | BaseSpecification | Adding core image registry integration 04:32:03 | DEBUG | VulnMgmtSACTest | ImageIntegrationService | Integration tested: core quay 04:32:03 | DEBUG | VulnMgmtSACTest | ImageIntegrationService | Integration created: core quay: 72465733-0138-4f8e-841b-7e73a9c6624a 04:32:03 | DEBUG | VulnMgmtSACTest | ImageIntegrationService | Integration found after creation: core quay: 72465733-0138-4f8e-841b-7e73a9c6624a 04:32:03 | DEBUG | VulnMgmtSACTest | OpenShift | Namespace qa already exists 04:32:03 | DEBUG | VulnMgmtSACTest | OpenShift | Adding system:serviceaccount:qa:default to anyuid user list 04:32:10 | DEBUG | VulnMgmtSACTest | VulnMgmtSACTest | Scanned Image quay.io/rhacs-eng/qa:centos7-base 04:32:17 | DEBUG | VulnMgmtSACTest | VulnMgmtSACTest | Scanned Image quay.io/rhacs-eng/qa-multi-arch:nginx-1.12@sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728 04:32:17 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: imageVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: imageVulnerabilityCount(query: $query)\n }\n fragment cveFields on ImageVulnerability {\n cve\n }\n ","variables":{"query":"Image:*"}} 04:32:17 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"cve":"CVE-2005-2541","__typename":"ImageVulnerability"},{"cve":"CVE-2007-4559","__typename":"ImageVulnerability"},{"cve":"CVE-2007-5686","__typename":"ImageVulnerability"},{"cve":"CVE-2007-6755","__typename":"ImageVulnerability"},{"cve":"CVE-2009-4487","__typename":"ImageVulnerability"},{"cve":"CVE-2009-5155","__typename":"ImageVulnerability"},{"cve":"CVE-2010-0928","__typename":"ImageVulnerability"},{"cve":"CVE-2010-4756","__typename":"ImageVulnerability"},{"cve":"CVE-2011-3374","__typename":"ImageVulnerability"},{"cve":"CVE-2011-4116","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6702","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6711","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0337","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0340","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0341","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1664","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1665","__typename":"ImageVulnerability"},{"cve":"CVE-2013-4... 04:32:17 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | CVE data successfully indexed: 1148 CVEs found 04:32:17 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Created Role: name: "node-role" permission_set_id: "596b3f1d-ce67-441e-be68-b98472aef4a9" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 04:32:17 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Created Role: name: "image-role" permission_set_id: "abfd6677-afb1-4da5-a483-2eb3e413ac33" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 04:32:17 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Created Role: name: "node-image-role" permission_set_id: "2b15bed5-1d63-46e3-943d-0bc42c92325d" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" VulnMgmtSACTest > Verify role based scoping on vuln mgmt: node-role Node:* STANDARD_OUT 04:32:17 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Starting testcase: Verify role based scoping on vuln mgmt: node-role Node:* 04:32:17 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: nodeVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: nodeVulnerabilityCount(query: $query)\n }\n fragment cveFields on NodeVulnerability {\n cve\n }\n ","variables":{"query":"Node:*"}} 04:32:17 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:32:17 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: nodeComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: nodeComponentCount(query: $query)\n }\n fragment componentFields on NodeComponent {\n name\n version\n }\n ","variables":{"query":"Node:*"}} 04:32:17 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:32:17 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: nodeVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: nodeVulnerabilityCount(query: $query)\n }\n fragment cveFields on NodeVulnerability {\n cve\n }\n ","variables":{"query":""}} 04:32:18 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:32:18 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: nodeComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: nodeComponentCount(query: $query)\n }\n fragment componentFields on NodeComponent {\n name\n version\n }\n ","variables":{"query":""}} 04:32:18 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:32:18 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Ending testcase VulnMgmtSACTest > Verify role based scoping on vuln mgmt: node-role Node:* PASSED VulnMgmtSACTest > Verify role based scoping on vuln mgmt: image-role Image:* STANDARD_OUT 04:32:18 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Starting testcase: Verify role based scoping on vuln mgmt: image-role Image:* 04:32:18 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: imageVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: imageVulnerabilityCount(query: $query)\n }\n fragment cveFields on ImageVulnerability {\n cve\n }\n ","variables":{"query":"Image:*"}} 04:32:18 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"cve":"CVE-2005-2541","__typename":"ImageVulnerability"},{"cve":"CVE-2007-4559","__typename":"ImageVulnerability"},{"cve":"CVE-2007-5686","__typename":"ImageVulnerability"},{"cve":"CVE-2007-6755","__typename":"ImageVulnerability"},{"cve":"CVE-2009-4487","__typename":"ImageVulnerability"},{"cve":"CVE-2009-5155","__typename":"ImageVulnerability"},{"cve":"CVE-2010-0928","__typename":"ImageVulnerability"},{"cve":"CVE-2010-4756","__typename":"ImageVulnerability"},{"cve":"CVE-2011-3374","__typename":"ImageVulnerability"},{"cve":"CVE-2011-4116","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6702","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6711","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0337","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0340","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0341","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1664","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1665","__typename":"ImageVulnerability"},{"cve":"CVE-2013-4... 04:32:18 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: imageComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: imageComponentCount(query: $query)\n }\n fragment componentFields on ImageComponent {\n name\n version\n }\n ","variables":{"query":"Image:*"}} 04:32:18 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"name":"aardvark-dns","version":"2:1.10.0-3.el9_4.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.2.51-15.el7","__typename":"ImageComponent"},{"name":"acl","version":"2.2.52-3","__typename":"ImageComponent"},{"name":"acl","version":"2.2.53-3.el8.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-3.el9.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-4.el9.x86_64","__typename":"ImageComponent"},{"name":"adduser","version":"3.115","__typename":"ImageComponent"},{"name":"alternatives","version":"1.20-2.el9.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-1.el9_4.1.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-2.el9.x86_64","__typename":"ImageComponent"},{"name":"apt","version":"1.4.8","__typename":"ImageComponent"},{"name":"attr","version":"1:2.4.47-2","__typename":"ImageComponent"},{"name":"audit","version":"1:2.6.7-2","__typename":"ImageComponent"},{"name":"audit-libs","ve... 04:32:18 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: imageVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: imageVulnerabilityCount(query: $query)\n }\n fragment cveFields on ImageVulnerability {\n cve\n }\n ","variables":{"query":""}} 04:32:18 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"cve":"CVE-2005-2541","__typename":"ImageVulnerability"},{"cve":"CVE-2007-4559","__typename":"ImageVulnerability"},{"cve":"CVE-2007-5686","__typename":"ImageVulnerability"},{"cve":"CVE-2007-6755","__typename":"ImageVulnerability"},{"cve":"CVE-2009-4487","__typename":"ImageVulnerability"},{"cve":"CVE-2009-5155","__typename":"ImageVulnerability"},{"cve":"CVE-2010-0928","__typename":"ImageVulnerability"},{"cve":"CVE-2010-4756","__typename":"ImageVulnerability"},{"cve":"CVE-2011-3374","__typename":"ImageVulnerability"},{"cve":"CVE-2011-4116","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6702","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6711","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0337","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0340","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0341","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1664","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1665","__typename":"ImageVulnerability"},{"cve":"CVE-2013-4... 04:32:18 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: imageComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: imageComponentCount(query: $query)\n }\n fragment componentFields on ImageComponent {\n name\n version\n }\n ","variables":{"query":""}} 04:32:18 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"name":"aardvark-dns","version":"2:1.10.0-3.el9_4.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.2.51-15.el7","__typename":"ImageComponent"},{"name":"acl","version":"2.2.52-3","__typename":"ImageComponent"},{"name":"acl","version":"2.2.53-3.el8.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-3.el9.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-4.el9.x86_64","__typename":"ImageComponent"},{"name":"adduser","version":"3.115","__typename":"ImageComponent"},{"name":"alternatives","version":"1.20-2.el9.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-1.el9_4.1.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-2.el9.x86_64","__typename":"ImageComponent"},{"name":"apt","version":"1.4.8","__typename":"ImageComponent"},{"name":"attr","version":"1:2.4.47-2","__typename":"ImageComponent"},{"name":"audit","version":"1:2.6.7-2","__typename":"ImageComponent"},{"name":"audit-libs","ve... 04:32:18 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Ending testcase VulnMgmtSACTest > Verify role based scoping on vuln mgmt: image-role Image:* PASSED VulnMgmtSACTest > Verify role based scoping on vuln mgmt: #roleName #baseQuery > Verify role based scoping on vuln mgmt: node-image-role Component:* STANDARD_OUT 04:32:18 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Starting testcase: Verify role based scoping on vuln mgmt: node-image-role Component:* 04:32:18 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: imageVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: imageVulnerabilityCount(query: $query)\n }\n fragment cveFields on ImageVulnerability {\n cve\n }\n ","variables":{"query":"ImageComponent:*"}} 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"cve":"CVE-2005-2541","__typename":"ImageVulnerability"},{"cve":"CVE-2007-4559","__typename":"ImageVulnerability"},{"cve":"CVE-2007-5686","__typename":"ImageVulnerability"},{"cve":"CVE-2007-6755","__typename":"ImageVulnerability"},{"cve":"CVE-2009-4487","__typename":"ImageVulnerability"},{"cve":"CVE-2009-5155","__typename":"ImageVulnerability"},{"cve":"CVE-2010-0928","__typename":"ImageVulnerability"},{"cve":"CVE-2010-4756","__typename":"ImageVulnerability"},{"cve":"CVE-2011-3374","__typename":"ImageVulnerability"},{"cve":"CVE-2011-4116","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6702","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6711","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0337","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0340","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0341","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1664","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1665","__typename":"ImageVulnerability"},{"cve":"CVE-2013-4... 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: imageComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: imageComponentCount(query: $query)\n }\n fragment componentFields on ImageComponent {\n name\n version\n }\n ","variables":{"query":"ImageComponent:*"}} 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"name":"aardvark-dns","version":"2:1.10.0-3.el9_4.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.2.51-15.el7","__typename":"ImageComponent"},{"name":"acl","version":"2.2.52-3","__typename":"ImageComponent"},{"name":"acl","version":"2.2.53-3.el8.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-3.el9.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-4.el9.x86_64","__typename":"ImageComponent"},{"name":"adduser","version":"3.115","__typename":"ImageComponent"},{"name":"alternatives","version":"1.20-2.el9.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-1.el9_4.1.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-2.el9.x86_64","__typename":"ImageComponent"},{"name":"apt","version":"1.4.8","__typename":"ImageComponent"},{"name":"attr","version":"1:2.4.47-2","__typename":"ImageComponent"},{"name":"audit","version":"1:2.6.7-2","__typename":"ImageComponent"},{"name":"audit-libs","ve... 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: nodeVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: nodeVulnerabilityCount(query: $query)\n }\n fragment cveFields on NodeVulnerability {\n cve\n }\n ","variables":{"query":"NodeComponent:*"}} 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: nodeComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: nodeComponentCount(query: $query)\n }\n fragment componentFields on NodeComponent {\n name\n version\n }\n ","variables":{"query":"NodeComponent:*"}} 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: imageVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: imageVulnerabilityCount(query: $query)\n }\n fragment cveFields on ImageVulnerability {\n cve\n }\n ","variables":{"query":""}} 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"cve":"CVE-2005-2541","__typename":"ImageVulnerability"},{"cve":"CVE-2007-4559","__typename":"ImageVulnerability"},{"cve":"CVE-2007-5686","__typename":"ImageVulnerability"},{"cve":"CVE-2007-6755","__typename":"ImageVulnerability"},{"cve":"CVE-2009-4487","__typename":"ImageVulnerability"},{"cve":"CVE-2009-5155","__typename":"ImageVulnerability"},{"cve":"CVE-2010-0928","__typename":"ImageVulnerability"},{"cve":"CVE-2010-4756","__typename":"ImageVulnerability"},{"cve":"CVE-2011-3374","__typename":"ImageVulnerability"},{"cve":"CVE-2011-4116","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6702","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6711","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0337","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0340","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0341","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1664","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1665","__typename":"ImageVulnerability"},{"cve":"CVE-2013-4... 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: imageComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: imageComponentCount(query: $query)\n }\n fragment componentFields on ImageComponent {\n name\n version\n }\n ","variables":{"query":""}} 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"name":"aardvark-dns","version":"2:1.10.0-3.el9_4.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.2.51-15.el7","__typename":"ImageComponent"},{"name":"acl","version":"2.2.52-3","__typename":"ImageComponent"},{"name":"acl","version":"2.2.53-3.el8.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-3.el9.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-4.el9.x86_64","__typename":"ImageComponent"},{"name":"adduser","version":"3.115","__typename":"ImageComponent"},{"name":"alternatives","version":"1.20-2.el9.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-1.el9_4.1.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-2.el9.x86_64","__typename":"ImageComponent"},{"name":"apt","version":"1.4.8","__typename":"ImageComponent"},{"name":"attr","version":"1:2.4.47-2","__typename":"ImageComponent"},{"name":"audit","version":"1:2.6.7-2","__typename":"ImageComponent"},{"name":"audit-libs","ve... 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: nodeVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: nodeVulnerabilityCount(query: $query)\n }\n fragment cveFields on NodeVulnerability {\n cve\n }\n ","variables":{"query":""}} 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: nodeComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: nodeComponentCount(query: $query)\n }\n fragment componentFields on NodeComponent {\n name\n version\n }\n ","variables":{"query":""}} 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:32:19 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Ending testcase VulnMgmtSACTest > Verify role based scoping on vuln mgmt: #roleName #baseQuery > Verify role based scoping on vuln mgmt: node-image-role Component:* PASSED VulnMgmtSACTest > Verify permissions on vuln mgmt: role with no CVE permissions is rejected STANDARD_OUT 04:32:19 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Starting testcase: Verify permissions on vuln mgmt: role with no CVE permissions is rejected 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: vulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: vulnerabilityCount(query: $query)\n }\n\n fragment cveFields on EmbeddedVulnerability {\n cve\n }\n ","variables":{"query":""}} 04:32:19 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 401 Unauthorized: access for this user is not authorized: no valid role, please contact your system administrator 04:32:19 | WARN | VulnMgmtSACTest | GraphQLService | There were errors in the graph QL response: services.GraphQLService$Response(401, null, [access for this user is not authorized: no valid role, please contact your system administrator ]) 04:32:19 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Ending testcase VulnMgmtSACTest > Verify permissions on vuln mgmt: role with no CVE permissions is rejected PASSED VulnMgmtSACTest STANDARD_OUT 04:32:20 | INFO | VulnMgmtSACTest | RoleService | Deleted role: node-role and permission set 04:32:20 | INFO | VulnMgmtSACTest | RoleService | Deleted role: image-role and permission set 04:32:20 | INFO | VulnMgmtSACTest | RoleService | Deleted role: node-image-role and permission set 04:32:20 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Ending testsuite 04:32:20 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Checking if cluster is healthy after test 04:32:20 | DEBUG | VulnMgmtSACTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries 04:32:20 | INFO | | BaseSpecification | Performing global shutdown 04:32:20 | INFO | | RoleService | Deleted role: Test Automation Role - 15513 and permission set 04:32:20 | INFO | | BaseSpecification | Removing core image registry integration 04:32:20 | DEBUG | | ImageIntegrationService | Image integration deleted: 72465733-0138-4f8e-841b-7e73a9c6624a > Task :testParallel ProcessesListeningOnPortsTest STANDARD_OUT 04:32:24 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Starting testsuite 04:32:24 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testsuite 04:32:24 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testsuite 04:32:24 | INFO | ImageManagementTest | ImageManagementTest | Starting testsuite 04:32:24 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testsuite 04:32:24 | INFO | AdmissionControllerTest | BaseSpecification | Performing global setup 04:32:25 | DEBUG | AdmissionControllerTest | Kubernetes | quay: secret created. 04:32:25 | DEBUG | AdmissionControllerTest | Kubernetes | public-dockerhub: secret created. 04:32:25 | DEBUG | AdmissionControllerTest | Kubernetes | gcr-image-pull-secret: secret created. 04:32:25 | DEBUG | AdmissionControllerTest | Kubernetes | redhat-image-pull-secret: secret created. 04:32:25 | DEBUG | AdmissionControllerTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:32:25 | INFO | AdmissionControllerTest | BaseSpecification | Testing against: 04:32:26 | INFO | AdmissionControllerTest | BaseSpecification | version: "4.10.x-207-g071f40eed6" build_flavor: "development" license_status: VALID 04:32:26 | INFO | AdmissionControllerTest | BaseSpecification | isGKE: false 04:32:26 | INFO | AdmissionControllerTest | BaseSpecification | isEKS: false 04:32:26 | INFO | AdmissionControllerTest | BaseSpecification | isOpenShift4: true 04:32:26 | INFO | AdmissionControllerTest | BaseSpecification | testTarget: test 04:32:26 | INFO | AdmissionControllerTest | BaseSpecification | Adding core image registry integration 04:32:26 | DEBUG | AdmissionControllerTest | ImageIntegrationService | Integration tested: core quay 04:32:26 | DEBUG | AdmissionControllerTest | ImageIntegrationService | Integration created: core quay: 3cf81b31-bf9d-4982-b525-275e5e470e03 04:32:26 | DEBUG | AdmissionControllerTest | ImageIntegrationService | Integration found after creation: core quay: 3cf81b31-bf9d-4982-b525-275e5e470e03 04:32:26 | DEBUG | AdmissionControllerTest | OpenShift | Namespace qa already exists ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Latest tag - quay.io STANDARD_OUT 04:32:26 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Latest tag - quay.io 04:32:26 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Starting testcase: Check successful creation, update, and deletion of declarative resources 04:32:27 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:32:27 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | created declarative configuration configMap e5a5f91a-902c-441c-ae8f-9f51531112ad 04:32:27 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateExpectedHealthStatus with 60 retries 04:32:27 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for namespace qa-plop to be deleted 04:32:27 | DEBUG | ProcessesListeningOnPorts | Kubernetes | K8s found that namespace qa-plop was deleted 04:32:27 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for namespace qa-plop to be deleted 04:32:27 | DEBUG | ProcessesListeningOnPorts | Kubernetes | K8s found that namespace qa-plop was deleted ProcessesListeningOnPortsTest > Verify networking endpoints with processes appear in API at the deployment level STANDARD_OUT 04:32:27 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify networking endpoints with processes appear in API at the deployment level 04:32:27 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: health != null | | null false Expected resource 'declarative-config-test--permission-set' not found in health status. Available resources: Config Map declarative-configurations, Config Map sensitive-declarative-configurations 04:32:27 | INFO | ProcessesListeningOnPorts | OpenShift | Created namespace qa-plop 04:32:27 | INFO | ProcessesListeningOnPorts | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-plop namespace. ProcessBaselinesTest > Verify processes risk indicators for the given key after lock on #deploymentName > Verify processes risk indicators for the given key after lock on pb-deploymentnginx-lock STANDARD_OUT 04:32:27 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Verify processes risk indicators for the given key after lock on pb-deploymentnginx-lock 04:32:27 | DEBUG | ProcessesListeningOnPorts | Kubernetes | quay: secret created. 04:32:27 | DEBUG | ProcessesListeningOnPorts | Kubernetes | default-dockercfg-9g79g: secret created. 04:32:27 | DEBUG | ProcessesListeningOnPorts | Kubernetes | redhat-image-pull-secret: secret created. 04:32:27 | INFO | ProcessBaselinesTest | OpenShift | Created namespace qa-process-baselines 04:32:27 | INFO | ProcessBaselinesTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-process-baselines namespace. 04:32:27 | DEBUG | ProcessesListeningOnPorts | Kubernetes | public-dockerhub: secret created. 04:32:27 | DEBUG | ProcessBaselinesTest | Kubernetes | quay: secret created. 04:32:27 | DEBUG | ProcessesListeningOnPorts | Kubernetes | gcr-image-pull-secret: secret created. 04:32:27 | DEBUG | ProcessBaselinesTest | Kubernetes | default-dockercfg-9g79g: secret created. 04:32:27 | DEBUG | ProcessBaselinesTest | Kubernetes | redhat-image-pull-secret: secret created. 04:32:27 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:32:27 | DEBUG | ProcessesListeningOnPorts | OpenShift | Adding system:serviceaccount:qa-plop:default to anyuid user list 04:32:27 | DEBUG | ProcessBaselinesTest | Kubernetes | public-dockerhub: secret created. 04:32:27 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-nginx:latest with sendNotifications=false 04:32:27 | DEBUG | ProcessBaselinesTest | Kubernetes | gcr-image-pull-secret: secret created. 04:32:27 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1 service created 04:32:27 | DEBUG | ProcessBaselinesTest | OpenShift | Adding system:serviceaccount:qa-process-baselines:default to anyuid user list 04:32:28 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-lock 04:32:28 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-lock to start 04:32:28 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-lock's pods: 04:32:28 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-lock-7d54cc4c76-nn4x6 Container status: [] 04:32:28 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-lock 04:32:31 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-lock to start 04:32:31 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-lock's pods: 04:32:31 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-lock-7d54cc4c76-nn4x6 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:32:28Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:32:31 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-lock 04:32:31 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-lock 04:32:31 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-lock with 1 pods 04:32:31 | INFO | ProcessBaselinesTest | Services | SR found deployment pb-deploymentnginx-lock within 0s 04:32:31 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-lock-7d54cc4c76-nn4x6 is running 04:32:31 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-lock-7d54cc4c76-nn4x6: [ls] 04:32:31 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-1 04:32:31 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:32:31 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2 service created 04:32:31 | DEBUG | | Kubernetes | Command exited with 0 04:32:31 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:32:31 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: bin boot dev etc home lib lib64 media mnt opt proc root run sbin srv sys tmp usr var Stderr: 04:32:31 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, cafcc4b9-aa9a-41ae-8278-cad1e169b044, pb-deploymentnginx-lock within 0s 04:32:31 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 0 of 10): java.lang.RuntimeException: Baseline objects.Deployment@5021b7f7 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:cafcc4b9-aa9a-41ae-8278-cad1e169b044:pb-deploymentnginx-lock" key { deployment_id: "cafcc4b9-aa9a-41ae-8278-cad1e169b044" container_name: "pb-deploymentnginx-lock" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } created { seconds: 1761885151 nanos: 380802906 } stack_rox_locked_timestamp { seconds: 1761885211 nanos: 380803106 } last_update { seconds: 1761885151 nanos: 380802906 } . 04:32:32 | DEBUG | DeclarativeConfigTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:32:32 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:32:32 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | updated declarative permission set to be invalid in configMap e5a5f91a-902c-441c-ae8f-9f51531112ad 04:32:32 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1761885148 nanos: 994693131 } 04:32:32 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-2 04:32:32 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:32:32 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3 service created 04:32:34 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Latest tag - quay.io PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Latest tag - quay.io (repeat) STANDARD_OUT 04:32:34 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Latest tag - quay.io (repeat) 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-3 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-1 to start 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-1's pods: 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-qnzbh Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:32:31Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-1 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target-1 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-1 with 1 pods 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-2 to start 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-2's pods: 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-2-6f4fbcc974-kn5q8 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:32:33Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-2 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target-2 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-2 with 1 pods 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-3 to start 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-3's pods: 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-3-767d5fbfd-t5zws Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:32:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | 0/1 are in the ready state for tcp-connection-target-3 04:32:34 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:32:34 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-nginx:latest with sendNotifications=false 04:32:34 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Latest tag - quay.io (repeat) PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - 90-Day Image Age - quay.io STANDARD_OUT 04:32:34 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - 90-Day Image Age - quay.io 04:32:35 | INFO | ImageManagementTest | Services | Updated lifecycleStage of '90-Day Image Age - qa-image-management' to [BUILD, DEPLOY] 04:32:35 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch:struts-app with sendNotifications=false 04:32:37 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 1 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1761885148 nanos: 994693131 } 04:32:37 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-3 to start 04:32:37 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-3's pods: 04:32:37 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-3-767d5fbfd-t5zws Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:32:35Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:32:37 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-3 04:32:37 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 3 seconds for k8s deployment tcp-connection-target-3 04:32:37 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-3 with 1 pods 04:32:37 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-1 within 0s 04:32:37 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-2 within 0s 04:32:37 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-3 within 0s 04:32:37 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:38 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:39 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:40 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:41 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, cafcc4b9-aa9a-41ae-8278-cad1e169b044, pb-deploymentnginx-lock within 0s 04:32:41 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 1 of 10): java.lang.RuntimeException: Baseline objects.Deployment@5021b7f7 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:cafcc4b9-aa9a-41ae-8278-cad1e169b044:pb-deploymentnginx-lock" key { deployment_id: "cafcc4b9-aa9a-41ae-8278-cad1e169b044" container_name: "pb-deploymentnginx-lock" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1761885151 nanos: 380802906 } stack_rox_locked_timestamp { seconds: 1761885211 nanos: 380803106 } last_update { seconds: 1761885154 nanos: 863338658 } . 04:32:41 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:42 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 2 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1761885148 nanos: 994693131 } 04:32:42 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:43 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:44 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:45 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - 90-Day Image Age - quay.io PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Ubuntu Package Manager in Image - quay.io STANDARD_OUT 04:32:45 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Ubuntu Package Manager in Image - quay.io 04:32:45 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Ubuntu Package Manager in Image - qa-image-management' to [BUILD, DEPLOY] 04:32:45 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch:struts-app with sendNotifications=false 04:32:45 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Ubuntu Package Manager in Image - quay.io PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Curl in Image - quay.io STANDARD_OUT 04:32:45 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Curl in Image - quay.io 04:32:45 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:46 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Curl in Image - qa-image-management' to [BUILD, DEPLOY] 04:32:46 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch:struts-app with sendNotifications=false 04:32:46 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Curl in Image - quay.io PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Fixable CVSS >= 7 - quay.io STANDARD_OUT 04:32:46 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Fixable CVSS >= 7 - quay.io 04:32:46 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Fixable CVSS >= 7 - qa-image-management' to [BUILD, DEPLOY] 04:32:46 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:47 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch:nginx-1.12 with sendNotifications=false 04:32:47 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 3 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1761885148 nanos: 994693131 } 04:32:47 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:48 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Fixable CVSS >= 7 - quay.io PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Wget in Image - quay.io STANDARD_OUT 04:32:48 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Wget in Image - quay.io 04:32:49 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:49 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Wget in Image - qa-image-management' to [BUILD, DEPLOY] 04:32:49 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa:struts-app with sendNotifications=false 04:32:50 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:51 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:51 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, cafcc4b9-aa9a-41ae-8278-cad1e169b044, pb-deploymentnginx-lock within 0s 04:32:51 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 2 of 10): java.lang.RuntimeException: Baseline objects.Deployment@5021b7f7 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:cafcc4b9-aa9a-41ae-8278-cad1e169b044:pb-deploymentnginx-lock" key { deployment_id: "cafcc4b9-aa9a-41ae-8278-cad1e169b044" container_name: "pb-deploymentnginx-lock" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1761885151 nanos: 380802906 } stack_rox_locked_timestamp { seconds: 1761885211 nanos: 380803106 } last_update { seconds: 1761885154 nanos: 863338658 } . 04:32:52 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:52 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 4 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1761885148 nanos: 994693131 } 04:32:53 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:54 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:55 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:56 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:57 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:57 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 5 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1761885148 nanos: 994693131 } 04:32:58 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:32:59 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:00 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:00 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Wget in Image - quay.io PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Apache Struts: CVE-2017-5638 - quay.io STANDARD_OUT 04:33:00 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Apache Struts: CVE-2017-5638 - quay.io 04:33:01 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Apache Struts: CVE-2017-5638 - qa-image-management' to [BUILD, DEPLOY] 04:33:01 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:01 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch:struts-app with sendNotifications=false 04:33:01 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Apache Struts: CVE-2017-5638 - quay.io PASSED ImageManagementTest > Verify two consecutive latest tag image have different scans STANDARD_OUT 04:33:01 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify two consecutive latest tag image have different scans 04:33:01 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, cafcc4b9-aa9a-41ae-8278-cad1e169b044, pb-deploymentnginx-lock within 0s 04:33:01 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 3 of 10): java.lang.RuntimeException: Baseline objects.Deployment@5021b7f7 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:cafcc4b9-aa9a-41ae-8278-cad1e169b044:pb-deploymentnginx-lock" key { deployment_id: "cafcc4b9-aa9a-41ae-8278-cad1e169b044" container_name: "pb-deploymentnginx-lock" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1761885151 nanos: 380802906 } stack_rox_locked_timestamp { seconds: 1761885211 nanos: 380803106 } last_update { seconds: 1761885154 nanos: 863338658 } . 04:33:02 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:02 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 6 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1761885148 nanos: 994693131 } 04:33:03 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:04 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:05 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:06 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:07 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:07 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 7 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1761885148 nanos: 994693131 } 04:33:07 | INFO | AdmissionControllerTest | OpenShift | Created namespace qa-admission-controller-test 04:33:07 | INFO | AdmissionControllerTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-admission-controller-test namespace. 04:33:08 | DEBUG | AdmissionControllerTest | Kubernetes | quay: secret created. 04:33:08 | DEBUG | AdmissionControllerTest | Kubernetes | default-dockercfg-9g79g: secret created. 04:33:08 | DEBUG | AdmissionControllerTest | Kubernetes | redhat-image-pull-secret: secret created. 04:33:08 | DEBUG | AdmissionControllerTest | Kubernetes | public-dockerhub: secret created. 04:33:08 | DEBUG | AdmissionControllerTest | Kubernetes | gcr-image-pull-secret: secret created. 04:33:08 | DEBUG | AdmissionControllerTest | OpenShift | Adding system:serviceaccount:qa-admission-controller-test:default to anyuid user list 04:33:08 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: no bypass annotation, non-bypassable STANDARD_OUT 04:33:08 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Config: no bypass annotation, non-bypassable 04:33:09 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:10 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:11 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:11 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, cafcc4b9-aa9a-41ae-8278-cad1e169b044, pb-deploymentnginx-lock within 0s 04:33:11 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 4 of 10): java.lang.RuntimeException: Baseline objects.Deployment@5021b7f7 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:cafcc4b9-aa9a-41ae-8278-cad1e169b044:pb-deploymentnginx-lock" key { deployment_id: "cafcc4b9-aa9a-41ae-8278-cad1e169b044" container_name: "pb-deploymentnginx-lock" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1761885151 nanos: 380802906 } stack_rox_locked_timestamp { seconds: 1761885211 nanos: 380803106 } last_update { seconds: 1761885154 nanos: 863338658 } . 04:33:12 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify two consecutive latest tag image have different scans PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - nginx-1.19-alpine STANDARD_OUT 04:33:12 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - nginx-1.19-alpine 04:33:12 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:12 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:33:12 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | updated declarative access scope to be invalid in configMap e5a5f91a-902c-441c-ae8f-9f51531112ad 04:33:12 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1761885188 nanos: 916892761 } 04:33:13 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:13 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_0(AdmissionControllerTest.groovy:175) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:33:13 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: no bypass annotation, non-bypassable PASSED AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: bypass annotation, non-bypassable STANDARD_OUT 04:33:13 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Config: bypass annotation, non-bypassable 04:33:14 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:15 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:15 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:15 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify networking endpoints with processes appear in API at the deployment level PASSED ProcessesListeningOnPortsTest > Networking endpoints are no longer in the API when deployments are deleted STANDARD_OUT 04:33:15 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Networking endpoints are no longer in the API when deployments are deleted 04:33:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: Service deleting... 04:33:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: Service deleted 04:33:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-1 04:33:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: deployment removed. 04:33:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: Service deleting... 04:33:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: Service deleted 04:33:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-2 04:33:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: deployment removed. 04:33:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: Service deleting... 04:33:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: Service deleted 04:33:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-3 04:33:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: deployment removed. 04:33:15 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:15 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:15 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Networking endpoints are no longer in the API when deployments are deleted PASSED ProcessesListeningOnPortsTest > Verify networking endpoints disappear when process is terminated STANDARD_OUT 04:33:15 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify networking endpoints disappear when process is terminated 04:33:15 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:33:15 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - nginx-1.19-alpine PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - busybox-1-30 STANDARD_OUT 04:33:15 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - busybox-1-30 04:33:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1 service created 04:33:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-1 04:33:16 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:33:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2 service created 04:33:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-2 04:33:16 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:33:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3 service created 04:33:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-3 04:33:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-1 to start 04:33:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-1's pods: 04:33:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-fvvs4 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:33:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-qnzbh Container status: [ContainerState(running=null, terminated=ContainerStateTerminated(containerID=cri-o://8c7aa44be1e0f3344a91b4e0ea6d87ae3e9ffb571203e52912061252ac843a6b, exitCode=143, finishedAt=2025-10-31T04:33:15Z, message=null, reason=Error, signal=null, startedAt=2025-10-31T04:32:31Z, additionalProperties={}), waiting=null, additionalProperties={})] 04:33:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | 0/1 are in the ready state for tcp-connection-target-1 04:33:17 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - busybox-1-30 PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - centos7-base STANDARD_OUT 04:33:17 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - centos7-base 04:33:17 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 1 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1761885188 nanos: 916892761 } 04:33:17 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - centos7-base PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - fedora-6fb84ba634fe68572a2ac99741062695db24b921d0aa72e61ee669902f88c187 STANDARD_OUT 04:33:17 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - fedora-6fb84ba634fe68572a2ac99741062695db24b921d0aa72e61ee669902f88c187 04:33:18 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_0(AdmissionControllerTest.groovy:175) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:33:18 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: bypass annotation, non-bypassable PASSED AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: bypass annotation, bypassable STANDARD_OUT 04:33:18 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Config: bypass annotation, bypassable 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-1 to start 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-1's pods: 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-fvvs4 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:33:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-1 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 3 seconds for k8s deployment tcp-connection-target-1 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-1 with 1 pods 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-2 to start 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-2's pods: 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-2-6f4fbcc974-dq64s Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:33:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-2 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target-2 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-2 with 1 pods 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-3 to start 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-3's pods: 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-3-767d5fbfd-t5zws Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:32:35Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-3-767d5fbfd-vcgqn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:33:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-3 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target-3 04:33:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-3 with 2 pods 04:33:19 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-1 within 0s 04:33:19 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-2 within 0s 04:33:19 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-3 within 0s 04:33:19 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:20 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:21 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - fedora-6fb84ba634fe68572a2ac99741062695db24b921d0aa72e61ee669902f88c187 PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - nginx-1-9 STANDARD_OUT 04:33:21 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - nginx-1-9 04:33:21 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, cafcc4b9-aa9a-41ae-8278-cad1e169b044, pb-deploymentnginx-lock within 0s 04:33:21 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 5 of 10): java.lang.RuntimeException: Baseline objects.Deployment@5021b7f7 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:cafcc4b9-aa9a-41ae-8278-cad1e169b044:pb-deploymentnginx-lock" key { deployment_id: "cafcc4b9-aa9a-41ae-8278-cad1e169b044" container_name: "pb-deploymentnginx-lock" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1761885151 nanos: 380802906 } stack_rox_locked_timestamp { seconds: 1761885211 nanos: 380803106 } last_update { seconds: 1761885154 nanos: 863338658 } . 04:33:21 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:22 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:22 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 2 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1761885188 nanos: 916892761 } 04:33:23 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:23 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace busybox-bypass 04:33:23 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: busybox-bypass 04:33:23 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: bypass annotation, bypassable PASSED AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: nginx w/ inline scan STANDARD_OUT 04:33:23 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Config: nginx w/ inline scan 04:33:24 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:25 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:25 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - nginx-1-9 PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - nginx-1-17-1 STANDARD_OUT 04:33:25 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - nginx-1-17-1 04:33:26 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:27 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:27 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 3 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1761885188 nanos: 916892761 } 04:33:28 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:28 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_0(AdmissionControllerTest.groovy:175) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:33:28 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: nginx w/ inline scan PASSED AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: no bypass annotation, non-bypassable STANDARD_OUT 04:33:28 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement on Updates: no bypass annotation, non-bypassable 04:33:29 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - nginx-1-17-1 PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - ubi9-slf4j STANDARD_OUT 04:33:29 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - ubi9-slf4j 04:33:29 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:30 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:31 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, cafcc4b9-aa9a-41ae-8278-cad1e169b044, pb-deploymentnginx-lock within 0s 04:33:31 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Baseline Before after observation: id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:cafcc4b9-aa9a-41ae-8278-cad1e169b044:pb-deploymentnginx-lock" key { deployment_id: "cafcc4b9-aa9a-41ae-8278-cad1e169b044" container_name: "pb-deploymentnginx-lock" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1761885151 nanos: 380802906 } stack_rox_locked_timestamp { seconds: 1761885211 nanos: 380803106 } last_update { seconds: 1761885154 nanos: 863338658 } 04:33:31 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:32 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:32 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 4 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1761885188 nanos: 916892761 } 04:33:33 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:34 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace busybox-no-bypass 04:33:34 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment busybox-no-bypass with version 40837 found in namespace qa-admission-controller-test. Updating... 04:33:34 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy:212) at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_2(AdmissionControllerTest.groovy:355) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:33:34 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: busybox-no-bypass 04:33:34 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: no bypass annotation, non-bypassable PASSED AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: bypass annotation, non-bypassable STANDARD_OUT 04:33:34 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement on Updates: bypass annotation, non-bypassable 04:33:34 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:35 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:36 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:37 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - ubi9-slf4j PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - apache-server STANDARD_OUT 04:33:37 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - apache-server 04:33:37 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:37 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 5 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1761885188 nanos: 916892761 } 04:33:38 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:39 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace busybox-bypass 04:33:39 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment busybox-bypass with version 40887 found in namespace qa-admission-controller-test. Updating... 04:33:39 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy:212) at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_2(AdmissionControllerTest.groovy:355) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:33:39 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: busybox-bypass 04:33:39 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: bypass annotation, non-bypassable PASSED AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: bypass annotation, bypassable STANDARD_OUT 04:33:39 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement on Updates: bypass annotation, bypassable 04:33:39 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:40 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:41 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-lock-7d54cc4c76-nn4x6 is running 04:33:41 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-lock-7d54cc4c76-nn4x6: [pwd] 04:33:41 | DEBUG | | Kubernetes | Command exited with 0 04:33:41 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:33:41 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:33:41 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:42 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 6 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1761885188 nanos: 916892761 } 04:33:42 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:43 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:44 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace busybox-bypass 04:33:44 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment busybox-bypass with version 40932 found in namespace qa-admission-controller-test. Updating... 04:33:44 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace busybox-bypass 04:33:44 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: busybox-bypass 04:33:44 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: bypass annotation, bypassable PASSED AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: nginx w/ inline scan STANDARD_OUT 04:33:44 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement on Updates: nginx w/ inline scan 04:33:44 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:45 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:45 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:46 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:47 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - apache-server PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - ubuntu-22.10-openssl STANDARD_OUT 04:33:47 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - ubuntu-22.10-openssl 04:33:47 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 7 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1761885188 nanos: 916892761 } 04:33:48 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:49 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:50 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:50 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Cleaning up deployment: objects.Deployment@5021b7f7 04:33:50 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-lock 04:33:50 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-lock: deployment removed. 04:33:50 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Verify processes risk indicators for the given key after lock on #deploymentName > Verify processes risk indicators for the given key after lock on pb-deploymentnginx-lock PASSED ProcessBaselinesTest > Verify baseline process violation after resolve baseline on #deploymentName > Verify baseline process violation after resolve baseline on pb-deploymentnginx-violation-resolve STANDARD_OUT 04:33:50 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Verify baseline process violation after resolve baseline on pb-deploymentnginx-violation-resolve 04:33:50 | DEBUG | ProcessBaselinesTest | OpenShift | Namespace qa-process-baselines already exists 04:33:50 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-violation-resolve 04:33:50 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-violation-resolve to start 04:33:50 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-violation-resolve's pods: 04:33:50 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-violation-resolve-9bd5f87d-5hdgw Container status: [] 04:33:50 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-violation-resolve 04:33:51 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace scan-inline 04:33:51 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment scan-inline with version 41030 found in namespace qa-admission-controller-test. Updating... 04:33:51 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:51 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - ubuntu-22.10-openssl PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io] STANDARD_OUT 04:33:51 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io] 04:33:51 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at jdk.internal.reflect.GeneratedMethodAccessor797.invoke(Unknown Source) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [8 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy:212) at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_2(AdmissionControllerTest.groovy:355) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:33:51 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: scan-inline 04:33:51 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: nginx w/ inline scan PASSED AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: false/false STANDARD_OUT 04:33:51 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: false/false 04:33:51 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:33:51 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [quay.io] 04:33:51 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:33:52 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:52 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io] PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng] STANDARD_OUT 04:33:52 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng] 04:33:52 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:33:52 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [quay.io/rhacs-eng] 04:33:52 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:33:53 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:33:53 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | updated declarative role to be invalid in configMap e5a5f91a-902c-441c-ae8f-9f51531112ad 04:33:53 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1761885228 nanos: 918576849 } 04:33:53 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng] PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox] STANDARD_OUT 04:33:53 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox] 04:33:53 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:53 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:33:53 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [quay.io/rhacs-eng/qa-multi-arch-busybox] 04:33:53 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:33:53 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox] PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox:latest] STANDARD_OUT 04:33:53 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox:latest] 04:33:53 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:33:53 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-violation-resolve to start 04:33:54 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-violation-resolve's pods: 04:33:54 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-violation-resolve-9bd5f87d-5hdgw Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:33:51Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:33:54 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-violation-resolve 04:33:54 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-violation-resolve 04:33:54 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-violation-resolve with 1 pods 04:33:54 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [quay.io/rhacs-eng/qa-multi-arch-busybox:latest] 04:33:54 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:33:54 | INFO | ProcessBaselinesTest | Services | SR found deployment pb-deploymentnginx-violation-resolve within 0s 04:33:54 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, b8a9a18f-f284-4c87-9ca6-066df777fc93, pb-deploymentnginx-violation-resolve within 0s 04:33:54 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Baseline Before locking: id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:b8a9a18f-f284-4c87-9ca6-066df777fc93:pb-deploymentnginx-violation-resolve" key { deployment_id: "b8a9a18f-f284-4c87-9ca6-066df777fc93" container_name: "pb-deploymentnginx-violation-resolve" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1761885234 nanos: 83398368 } stack_rox_locked_timestamp { seconds: 1761885294 nanos: 83398578 } last_update { seconds: 1761885234 nanos: 83398368 } 04:33:54 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:54 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox:latest] PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [other] STANDARD_OUT 04:33:54 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [other] 04:33:54 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:33:54 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [other] 04:33:54 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:33:54 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [other] PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox:1.30] STANDARD_OUT 04:33:54 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox:1.30] 04:33:55 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:33:55 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:55 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [quay.io/rhacs-eng/qa-multi-arch-busybox:1.30] 04:33:55 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:33:55 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox:1.30] PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [rhacs-eng/qa-multi-arch-busybox:1.30] STANDARD_OUT 04:33:55 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [rhacs-eng/qa-multi-arch-busybox:1.30] 04:33:55 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:33:55 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [rhacs-eng/qa-multi-arch-busybox:1.30] 04:33:55 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:33:55 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [rhacs-eng/qa-multi-arch-busybox:1.30] PASSED ImageManagementTest > Verify lifecycle Stage can only be build time for policies with image criteria STANDARD_OUT 04:33:55 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify lifecycle Stage can only be build time for policies with image criteria 04:33:55 | WARN | ImageManagementTest | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: policy configuration is invalid for build time: generating evaluator for policy section "": compiling field query: &{CPU Cores Request [0.000000] Or false false}: invalid query: field CPU Cores Request unknown, excluding a deployment is only valid during the DEPLOY and RUNTIME lifecycles]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at ImageManagementTest.$spock_feature_1_4(ImageManagementTest.groovy:177) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:33:55 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify lifecycle Stage can only be build time for policies with image criteria PASSED ImageManagementTest > Verify CVE snoozing applies to build time detection SKIPPED ImageManagementTest > Verify risk is properly being attributed to scanned images STANDARD_OUT 04:33:55 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify risk is properly being attributed to scanned images 04:33:56 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify risk is properly being attributed to scanned images PASSED ImageManagementTest > Verify risk is properly being attributed to run images STANDARD_OUT 04:33:56 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify risk is properly being attributed to run images 04:33:56 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:56 | INFO | ImageManagementTest | OpenShift | Created namespace qa-image-management 04:33:56 | INFO | ImageManagementTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-image-management namespace. 04:33:56 | DEBUG | ImageManagementTest | Kubernetes | quay: secret created. 04:33:56 | DEBUG | ImageManagementTest | Kubernetes | default-dockercfg-9g79g: secret created. 04:33:56 | DEBUG | ImageManagementTest | Kubernetes | redhat-image-pull-secret: secret created. 04:33:56 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace scoped-enforcement-false-false 04:33:56 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: scoped-enforcement-false-false 04:33:56 | DEBUG | ImageManagementTest | Kubernetes | public-dockerhub: secret created. 04:33:56 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: false/false PASSED AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: false/true STANDARD_OUT 04:33:56 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: false/true 04:33:56 | DEBUG | ImageManagementTest | Kubernetes | gcr-image-pull-secret: secret created. 04:33:56 | DEBUG | ImageManagementTest | OpenShift | Adding system:serviceaccount:qa-image-management:default to anyuid user list 04:33:56 | DEBUG | ImageManagementTest | Kubernetes | Told the orchestrator to createOrReplace risk-image 04:33:56 | DEBUG | ImageManagementTest | Kubernetes | Waiting for risk-image to start 04:33:56 | DEBUG | ImageManagementTest | Kubernetes | Status of risk-image's pods: 04:33:56 | DEBUG | ImageManagementTest | Kubernetes | - risk-image-77bcfddbfc-9hhtg Container status: [] 04:33:56 | DEBUG | ImageManagementTest | Kubernetes | 0/1 are in the ready state for risk-image 04:33:57 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:58 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 1 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1761885228 nanos: 918576849 } 04:33:58 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:59 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:33:59 | DEBUG | ImageManagementTest | Kubernetes | Waiting for risk-image to start 04:33:59 | DEBUG | ImageManagementTest | Kubernetes | Status of risk-image's pods: 04:33:59 | DEBUG | ImageManagementTest | Kubernetes | - risk-image-77bcfddbfc-9hhtg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:33:57Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:33:59 | DEBUG | ImageManagementTest | Kubernetes | All 1 replicas found in ready state for risk-image 04:33:59 | DEBUG | ImageManagementTest | Kubernetes | Took 3 seconds for k8s deployment risk-image 04:33:59 | DEBUG | ImageManagementTest | Kubernetes | Updating deployment risk-image with 1 pods 04:33:59 | DEBUG | ImageManagementTest | Kubernetes | Removed the deployment: risk-image 04:33:59 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify risk is properly being attributed to run images PASSED ImageManagementTest > Verify image scan results when CVEs are suppressed: SKIPPED ImageManagementTest > Verify CI/CD Integration Endpoint with notifications STANDARD_OUT 04:33:59 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint with notifications 04:34:00 | DEBUG | ImageManagementTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 04:34:00 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=true 04:34:00 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:00 | INFO | ImageManagementTest | ImageManagementTest | Most recent violation sent: [headers:[Accept-Encoding:[gzip], Authorization:[Basic YWRtaW46YWRtaW4=], Content-Length:[1491], Content-Type:[application/json], Headerkey:[headervalue], User-Agent:[Go-http-client/1.1]], data:[alert:[id:f11f734b-51fb-4bff-96c4-75a03928fe70, image:[id:sha256:907ca53d7e2947e849b839b1cd258c98fd3916c60f2e6e70c30edbf741ab6754, name:[fullName:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, registry:quay.io, remote:rhacs-eng/qa-multi-arch-busybox, tag:latest]], lifecycleStage:BUILD, policy:[SORTLifecycleStage:BUILD, SORTName:Latest tag - qa-image-management, categories:[Devops Best Practices, Supply Chain Security], description:Alert on deployments with images using tag 'latest', id:09e25680-9c8d-4c01-b0bf-29aff4232655, lastUpdated:2025-10-31T04:34:00.170825552Z, lifecycleStages:[BUILD], name:Latest tag - qa-image-management, notifiers:[c6fc2d64-5329-4c8b-a944-e8a34b08c6b8], policySections:[[policyGroups:[[fieldName:Image Tag, values:[[value:latest]]]]]], policyVersion:1.1, rationale:Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices., remediation:Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code., severity:LOW_SEVERITY], time:2025-10-31T04:34:00.242591085Z, violations:[[message:Image has tag 'latest']]], fieldkey:fieldvalue]] 04:34:00 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint with notifications PASSED ImageManagementTest STANDARD_OUT 04:34:00 | DEBUG | ImageManagementTest | Kubernetes | Waiting for namespace qa-image-management to be deleted 04:34:00 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:34:01 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:01 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace scoped-enforcement-false-true 04:34:01 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: scoped-enforcement-false-true 04:34:01 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: false/true PASSED AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: true/false STANDARD_OUT 04:34:01 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: true/false 04:34:02 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:03 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 2 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1761885228 nanos: 918576849 } 04:34:03 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:03 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:34:04 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-violation-resolve-9bd5f87d-5hdgw is running 04:34:04 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-violation-resolve-9bd5f87d-5hdgw: [pwd] 04:34:04 | DEBUG | | Kubernetes | Command exited with 0 04:34:04 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:34:04 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:34:04 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Locked Process Baseline after pwd: [id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:b8a9a18f-f284-4c87-9ca6-066df777fc93:pb-deploymentnginx-violation-resolve" key { deployment_id: "b8a9a18f-f284-4c87-9ca6-066df777fc93" container_name: "pb-deploymentnginx-violation-resolve" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1761885234 nanos: 83398368 } user_locked_timestamp { seconds: 1761885234 nanos: 110024644 } stack_rox_locked_timestamp { seconds: 1761885294 nanos: 83398578 } last_update { seconds: 1761885234 nanos: 110024853 } ] 04:34:04 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:34:04 | INFO | ProcessBaselinesTest | Services | violation size is: 1 04:34:04 | INFO | ProcessBaselinesTest | Services | Unauthorized Process Execution - qa-process-baselines triggered after waiting 0 seconds 04:34:04 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:34:04 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:04 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:34:05 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:06 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:06 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:34:07 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace scoped-enforcement-true-false 04:34:07 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: scoped-enforcement-true-false 04:34:07 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: true/false PASSED AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: true/true STANDARD_OUT 04:34:07 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: true/true 04:34:07 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:08 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 3 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1761885228 nanos: 918576849 } 04:34:08 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:09 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:09 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:34:10 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:11 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:12 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'scoped-enforcement-true-true' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'scoped-enforcement-true-true' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'scoped-enforcement-true-true' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'scoped-enforcement-true-true' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at jdk.internal.reflect.GeneratedMethodAccessor797.invoke(Unknown Source) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [8 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_3(AdmissionControllerTest.groovy:418) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:34:12 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:12 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: true/true PASSED AdmissionControllerTest > Verify admission controller does not impair cluster operations when unstable STANDARD_OUT 04:34:12 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify admission controller does not impair cluster operations when unstable 04:34:12 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:34:13 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 4 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1761885228 nanos: 918576849 } 04:34:13 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:14 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-violation-resolve-9bd5f87d-5hdgw is running 04:34:14 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-violation-resolve-9bd5f87d-5hdgw: [pwd] 04:34:14 | DEBUG | | Kubernetes | Command exited with 0 04:34:14 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:34:14 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:34:14 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:34:14 | INFO | ProcessBaselinesTest | Services | violation size is: 1 04:34:14 | INFO | ProcessBaselinesTest | Services | Unauthorized Process Execution - qa-process-baselines triggered after waiting 0 seconds 04:34:14 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:34:14 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:14 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:34:14 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-violation-resolve 04:34:14 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-violation-resolve: deployment removed. 04:34:14 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Verify baseline process violation after resolve baseline on #deploymentName > Verify baseline process violation after resolve baseline on pb-deploymentnginx-violation-resolve PASSED ProcessBaselinesTest > Verify baseline process violation after resolve baseline on #deploymentName > Verify baseline process violation after resolve baseline on pb-deploymentnginx-violation-resolve-baseline STANDARD_OUT 04:34:14 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Verify baseline process violation after resolve baseline on pb-deploymentnginx-violation-resolve-baseline 04:34:14 | DEBUG | ProcessBaselinesTest | OpenShift | Namespace qa-process-baselines already exists 04:34:14 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-violation-resolve-baseline 04:34:14 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-violation-resolve-baseline to start 04:34:14 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-violation-resolve-baseline's pods: 04:34:14 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-violation-resolve-baseline-64f955dcb-27c9g Container status: [] 04:34:14 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-violation-resolve-baseline 04:34:15 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:15 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:34:16 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:17 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:17 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2vgt2, ready=true. 04:34:17 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-rgqbq, ready=true. 04:34:17 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-xpd45, ready=true. 04:34:17 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-rgqbq. 04:34:17 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-violation-resolve-baseline to start 04:34:17 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-violation-resolve-baseline's pods: 04:34:17 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-xpd45. 04:34:17 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-violation-resolve-baseline-64f955dcb-27c9g Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:34:15Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:34:17 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-violation-resolve-baseline 04:34:17 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-violation-resolve-baseline 04:34:17 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-2vgt2. 04:34:17 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-violation-resolve-baseline with 1 pods 04:34:17 | INFO | ProcessBaselinesTest | Services | SR found deployment pb-deploymentnginx-violation-resolve-baseline within 0s 04:34:17 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 4ecbb98a-b379-4b3a-b120-8ce4f134bab0, pb-deploymentnginx-violation-resolve-baseline within 0s 04:34:17 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Baseline Before locking: id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:4ecbb98a-b379-4b3a-b120-8ce4f134bab0:pb-deploymentnginx-violation-resolve-baseline" key { deployment_id: "4ecbb98a-b379-4b3a-b120-8ce4f134bab0" container_name: "pb-deploymentnginx-violation-resolve-baseline" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1761885257 nanos: 828249267 } stack_rox_locked_timestamp { seconds: 1761885317 nanos: 828249457 } last_update { seconds: 1761885257 nanos: 828249267 } 04:34:18 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 5 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1761885228 nanos: 918576849 } 04:34:18 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:34:18 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:18 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2p4km, ready=false. 04:34:18 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2vgt2, ready=false. 04:34:18 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qwfv4, ready=false. 04:34:18 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-rgqbq, ready=false. 04:34:18 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ss7k7, ready=false. 04:34:18 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-xpd45, ready=false. 04:34:18 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:19 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:19 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2p4km, ready=false. 04:34:19 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2vgt2, ready=false. 04:34:19 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qwfv4, ready=false. 04:34:19 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-rgqbq, ready=false. 04:34:19 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ss7k7, ready=false. 04:34:19 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-xpd45, ready=false. 04:34:19 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41850 found in namespace qa-admission-controller-test. Updating... 04:34:20 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:20 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:20 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2p4km, ready=false. 04:34:20 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qwfv4, ready=false. 04:34:20 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ss7k7, ready=false. 04:34:20 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-xpd45, ready=false. 04:34:21 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41885 found in namespace qa-admission-controller-test. Updating... 04:34:21 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:21 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:34:21 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:22 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2p4km, ready=false. 04:34:22 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qwfv4, ready=false. 04:34:22 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ss7k7, ready=false. 04:34:22 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41927 found in namespace qa-admission-controller-test. Updating... 04:34:22 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:22 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:23 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2p4km, ready=false. 04:34:23 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qwfv4, ready=false. 04:34:23 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ss7k7, ready=false. 04:34:23 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 6 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1761885228 nanos: 918576849 } 04:34:23 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41946 found in namespace qa-admission-controller-test. Updating... 04:34:23 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:23 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:24 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2p4km, ready=false. 04:34:24 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qwfv4, ready=false. 04:34:24 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ss7k7, ready=false. 04:34:24 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41956 found in namespace qa-admission-controller-test. Updating... 04:34:24 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:24 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:34:24 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:25 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2p4km, ready=false. 04:34:25 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qwfv4, ready=false. 04:34:25 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ss7k7, ready=false. 04:34:25 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41965 found in namespace qa-admission-controller-test. Updating... 04:34:25 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:25 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:26 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2p4km, ready=false. 04:34:26 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qwfv4, ready=true. 04:34:26 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ss7k7, ready=true. 04:34:26 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-ss7k7. 04:34:26 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-qwfv4. 04:34:26 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41982 found in namespace qa-admission-controller-test. Updating... 04:34:26 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:26 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:27 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2p4km, ready=true. 04:34:27 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-4rvx4, ready=false. 04:34:27 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-bp574, ready=false. 04:34:27 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qwfv4, ready=false. 04:34:27 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ss7k7, ready=false. 04:34:27 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-2p4km. 04:34:27 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42035 found in namespace qa-admission-controller-test. Updating... 04:34:27 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:27 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:34:27 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:27 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-violation-resolve-baseline-64f955dcb-27c9g is running 04:34:27 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-violation-resolve-baseline-64f955dcb-27c9g: [pwd] 04:34:27 | DEBUG | | Kubernetes | Command exited with 0 04:34:27 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:34:27 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:34:27 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Locked Process Baseline after pwd: [id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:4ecbb98a-b379-4b3a-b120-8ce4f134bab0:pb-deploymentnginx-violation-resolve-baseline" key { deployment_id: "4ecbb98a-b379-4b3a-b120-8ce4f134bab0" container_name: "pb-deploymentnginx-violation-resolve-baseline" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1761885257 nanos: 828249267 } user_locked_timestamp { seconds: 1761885257 nanos: 848462232 } stack_rox_locked_timestamp { seconds: 1761885317 nanos: 828249457 } last_update { seconds: 1761885257 nanos: 848462402 } ] 04:34:27 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:34:28 | INFO | ProcessBaselinesTest | Services | violation size is: 1 04:34:28 | INFO | ProcessBaselinesTest | Services | Unauthorized Process Execution - qa-process-baselines triggered after waiting 0 seconds 04:34:28 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:34:28 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:34:28 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 7 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1761885228 nanos: 918576849 } 04:34:28 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2p4km, ready=false. 04:34:28 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-4rvx4, ready=false. 04:34:28 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9k5rv, ready=false. 04:34:28 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-bp574, ready=false. 04:34:28 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qwfv4, ready=false. 04:34:28 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ss7k7, ready=false. 04:34:28 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42084 found in namespace qa-admission-controller-test. Updating... 04:34:28 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:28 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:29 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-2p4km, ready=false. 04:34:29 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-4rvx4, ready=false. 04:34:29 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9k5rv, ready=false. 04:34:29 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-bp574, ready=false. 04:34:29 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42110 found in namespace qa-admission-controller-test. Updating... 04:34:29 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:29 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:30 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-4rvx4, ready=false. 04:34:30 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9k5rv, ready=false. 04:34:30 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-bp574, ready=false. 04:34:30 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:34:30 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42123 found in namespace qa-admission-controller-test. Updating... 04:34:30 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:30 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:31 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-4rvx4, ready=false. 04:34:31 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9k5rv, ready=false. 04:34:31 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-bp574, ready=false. 04:34:31 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42138 found in namespace qa-admission-controller-test. Updating... 04:34:31 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:31 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:32 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-4rvx4, ready=false. 04:34:32 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9k5rv, ready=false. 04:34:32 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-bp574, ready=false. 04:34:32 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42149 found in namespace qa-admission-controller-test. Updating... 04:34:32 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:32 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:33 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:34:33 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | updated declarative auth provider to be invalid in configMap e5a5f91a-902c-441c-ae8f-9f51531112ad 04:34:33 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1761885268 nanos: 945940121 } 04:34:33 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-4rvx4, ready=false. 04:34:33 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9k5rv, ready=false. 04:34:33 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-bp574, ready=false. 04:34:33 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:34:33 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:33 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42159 found in namespace qa-admission-controller-test. Updating... 04:34:33 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:34 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-4rvx4, ready=false. 04:34:34 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9k5rv, ready=false. 04:34:34 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-bp574, ready=true. 04:34:34 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-bp574. 04:34:34 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:34 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42170 found in namespace qa-admission-controller-test. Updating... 04:34:35 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:35 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-4rvx4, ready=true. 04:34:35 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9k5rv, ready=true. 04:34:35 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-bp574, ready=false. 04:34:35 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-hl4h9, ready=false. 04:34:35 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-9k5rv. 04:34:35 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-4rvx4. 04:34:35 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:36 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42203 found in namespace qa-admission-controller-test. Updating... 04:34:36 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:36 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:34:36 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-4rvx4, ready=false. 04:34:36 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9k5rv, ready=false. 04:34:36 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9ttbj, ready=false. 04:34:36 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-bp574, ready=false. 04:34:36 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-fz6vh, ready=false. 04:34:36 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-hl4h9, ready=false. 04:34:36 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:37 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42261 found in namespace qa-admission-controller-test. Updating... 04:34:37 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:37 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-4rvx4, ready=false. 04:34:37 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9k5rv, ready=false. 04:34:37 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9ttbj, ready=false. 04:34:37 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-fz6vh, ready=false. 04:34:37 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-hl4h9, ready=false. 04:34:37 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:38 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-violation-resolve-baseline-64f955dcb-27c9g is running 04:34:38 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-violation-resolve-baseline-64f955dcb-27c9g: [pwd] 04:34:38 | DEBUG | | Kubernetes | Command exited with 0 04:34:38 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:34:38 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:34:38 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:34:38 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42320 found in namespace qa-admission-controller-test. Updating... 04:34:38 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:38 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 1 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1761885268 nanos: 945940121 } 04:34:38 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9ttbj, ready=false. 04:34:38 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-fz6vh, ready=false. 04:34:38 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-hl4h9, ready=false. 04:34:38 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:39 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42350 found in namespace qa-admission-controller-test. Updating... 04:34:39 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:39 | DEBUG | ImageManagementTest | Kubernetes | K8s found that namespace qa-image-management was deleted 04:34:39 | INFO | ImageManagementTest | ImageManagementTest | Ending testsuite 04:34:39 | INFO | ImageManagementTest | ImageManagementTest | Checking if cluster is healthy after test 04:34:39 | DEBUG | ImageManagementTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries Gradle Test Executor 4 STANDARD_OUT 04:34:39 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9ttbj, ready=false. 04:34:39 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-fz6vh, ready=false. 04:34:39 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-hl4h9, ready=false. 04:34:39 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:40 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42361 found in namespace qa-admission-controller-test. Updating... 04:34:40 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:40 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9ttbj, ready=false. 04:34:40 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-fz6vh, ready=false. 04:34:40 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-hl4h9, ready=false. 04:34:40 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:41 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:34:41 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42369 found in namespace qa-admission-controller-test. Updating... 04:34:41 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:41 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9ttbj, ready=false. 04:34:41 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-fz6vh, ready=false. 04:34:41 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-hl4h9, ready=false. 04:34:42 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:42 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42379 found in namespace qa-admission-controller-test. Updating... 04:34:42 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:43 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9ttbj, ready=false. 04:34:43 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-fz6vh, ready=false. 04:34:43 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-hl4h9, ready=false. 04:34:43 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:43 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 2 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1761885268 nanos: 945940121 } 04:34:43 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42388 found in namespace qa-admission-controller-test. Updating... 04:34:43 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:44 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:44 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9ttbj, ready=false. 04:34:44 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-fz6vh, ready=false. 04:34:44 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-hl4h9, ready=true. 04:34:44 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-hl4h9. 04:34:44 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:34:44 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42401 found in namespace qa-admission-controller-test. Updating... 04:34:44 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:45 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:45 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-7x7r4, ready=false. 04:34:45 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9ttbj, ready=true. 04:34:45 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-fz6vh, ready=false. 04:34:45 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-hl4h9, ready=false. 04:34:45 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-9ttbj. 04:34:45 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42431 found in namespace qa-admission-controller-test. Updating... 04:34:45 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:46 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:46 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-5jwsg, ready=false. 04:34:46 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-7x7r4, ready=false. 04:34:46 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9ttbj, ready=false. 04:34:46 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-fz6vh, ready=true. 04:34:46 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-hl4h9, ready=false. 04:34:46 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-fz6vh. 04:34:46 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42469 found in namespace qa-admission-controller-test. Updating... 04:34:46 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:47 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:47 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:34:47 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-5jwsg, ready=false. 04:34:47 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-7x7r4, ready=false. 04:34:47 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-9ttbj, ready=false. 04:34:47 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-fz6vh, ready=false. 04:34:47 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-hl4h9, ready=false. 04:34:47 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-vglvm, ready=false. 04:34:47 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42510 found in namespace qa-admission-controller-test. Updating... 04:34:47 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:48 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:48 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-5jwsg, ready=false. 04:34:48 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-7x7r4, ready=false. 04:34:48 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-fz6vh, ready=false. 04:34:48 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-vglvm, ready=false. 04:34:48 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 3 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1761885268 nanos: 945940121 } 04:34:48 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42535 found in namespace qa-admission-controller-test. Updating... 04:34:49 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:49 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:49 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-5jwsg, ready=false. 04:34:49 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-7x7r4, ready=false. 04:34:49 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-vglvm, ready=false. 04:34:50 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42551 found in namespace qa-admission-controller-test. Updating... 04:34:50 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:50 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:50 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:34:50 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-5jwsg, ready=false. 04:34:50 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-7x7r4, ready=false. 04:34:50 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-vglvm, ready=false. 04:34:51 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42561 found in namespace qa-admission-controller-test. Updating... 04:34:51 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:51 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:51 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-5jwsg, ready=false. 04:34:51 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-7x7r4, ready=false. 04:34:51 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-vglvm, ready=false. 04:34:52 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42577 found in namespace qa-admission-controller-test. Updating... 04:34:52 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:52 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:52 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-5jwsg, ready=false. 04:34:52 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-7x7r4, ready=true. 04:34:52 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-vglvm, ready=false. 04:34:52 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-7x7r4. 04:34:53 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:53 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42589 found in namespace qa-admission-controller-test. Updating... 04:34:53 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:34:53 | INFO | ProcessBaselinesTest | Services | Failed to trigger Unauthorized Process Execution - qa-process-baselines after waiting 15 seconds 04:34:53 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:34:53 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:53 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-violation-resolve-baseline 04:34:53 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-violation-resolve-baseline: deployment removed. 04:34:53 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Verify baseline process violation after resolve baseline on #deploymentName > Verify baseline process violation after resolve baseline on pb-deploymentnginx-violation-resolve-baseline PASSED ProcessBaselinesTest > Verify baselines are deleted when their deployment is deleted STANDARD_OUT 04:34:53 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Verify baselines are deleted when their deployment is deleted 04:34:53 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 4 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1761885268 nanos: 945940121 } 04:34:53 | DEBUG | ProcessBaselinesTest | OpenShift | Namespace qa-process-baselines already exists 04:34:53 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-delete 04:34:53 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-delete to start 04:34:53 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-delete's pods: 04:34:53 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-delete-59967487b-w47np Container status: [] 04:34:53 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-delete 04:34:53 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-5jwsg, ready=true. 04:34:53 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-6rgjq, ready=false. 04:34:53 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-7x7r4, ready=false. 04:34:53 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-vglvm, ready=false. 04:34:53 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-5jwsg. 04:34:54 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:54 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42634 found in namespace qa-admission-controller-test. Updating... 04:34:54 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:54 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-5jwsg, ready=false. 04:34:54 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-6rgjq, ready=false. 04:34:54 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-7x7r4, ready=false. 04:34:54 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-gqxcm, ready=false. 04:34:54 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-vglvm, ready=true. 04:34:54 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-vglvm. 04:34:55 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:55 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42688 found in namespace qa-admission-controller-test. Updating... 04:34:55 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:55 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-5jwsg, ready=false. 04:34:55 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-6rgjq, ready=false. 04:34:55 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-gqxcm, ready=false. 04:34:55 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-sqbkq, ready=false. 04:34:55 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-vglvm, ready=false. 04:34:56 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:56 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42735 found in namespace qa-admission-controller-test. Updating... 04:34:56 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-delete to start 04:34:56 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-delete's pods: 04:34:56 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:56 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-delete-59967487b-w47np Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:34:54Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:34:56 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-delete 04:34:56 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-delete 04:34:56 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-delete with 1 pods 04:34:56 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 10fd513a-9e7c-48d7-aa25-cc0867c91b86, pb-deploymentnginx-delete within 0s 04:34:56 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-delete 04:34:56 | INFO | ProcessBaselinesTest | Services | SR does not detect the deployment pb-deploymentnginx-delete yet: io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id '10fd513a-9e7c-48d7-aa25-cc0867c91b86' does not exist: not found 04:34:56 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-6rgjq, ready=false. 04:34:56 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-gqxcm, ready=false. 04:34:56 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-sqbkq, ready=false. 04:34:56 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-vglvm, ready=false. 04:34:56 | WARN | ProcessBaselinesTest | ProcessBaselineService | Error getting process baselines io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id '"10fd513a-9e7c-48d7-aa25-cc0867c91b86"' does not exist: not found at io.stackrox.proto.api.v1.ProcessBaselineServiceGrpc$ProcessBaselineServiceBlockingStub.getProcessBaseline(ProcessBaselineServiceGrpc.java:455) [3 skipped] at services.ProcessBaselineService.getBaselineProcesses(ProcessBaselineService.groovy:141) at services.ProcessBaselineService.getProcessBaseline(ProcessBaselineService.groovy:38) at services.ProcessBaselineService.getProcessBaseline(ProcessBaselineService.groovy) at services.ProcessBaselineService.waitForDeploymentBaselinesDeleted(ProcessBaselineService.groovy:172) at ProcessBaselinesTest.$spock_feature_1_2(ProcessBaselinesTest.groovy:312) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:34:56 | DEBUG | ProcessBaselinesTest | ProcessBaselineService | SR has not found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 10fd513a-9e7c-48d7-aa25-cc0867c91b86, pb-deploymentnginx-delete yet 04:34:57 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:57 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42757 found in namespace qa-admission-controller-test. Updating... 04:34:57 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:57 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-6rgjq, ready=false. 04:34:57 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-gqxcm, ready=false. 04:34:57 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-sqbkq, ready=false. 04:34:58 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:58 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 5 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1761885268 nanos: 945940121 } 04:34:58 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42778 found in namespace qa-admission-controller-test. Updating... 04:34:58 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:58 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-6rgjq, ready=false. 04:34:58 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-gqxcm, ready=false. 04:34:58 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-sqbkq, ready=false. 04:34:59 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:59 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42787 found in namespace qa-admission-controller-test. Updating... 04:34:59 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:34:59 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-6rgjq, ready=false. 04:34:59 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-gqxcm, ready=false. 04:34:59 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-sqbkq, ready=false. 04:35:00 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:00 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42798 found in namespace qa-admission-controller-test. Updating... 04:35:00 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:35:00 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-6rgjq, ready=true. 04:35:00 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-gqxcm, ready=false. 04:35:00 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-sqbkq, ready=false. 04:35:00 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-6rgjq. 04:35:01 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:01 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42814 found in namespace qa-admission-controller-test. Updating... 04:35:01 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:35:01 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-6rgjq, ready=false. 04:35:01 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-gqxcm, ready=false. 04:35:01 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qhbkl, ready=false. 04:35:01 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-sqbkq, ready=false. 04:35:02 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:02 | WARN | ProcessBaselinesTest | ProcessBaselineService | Error getting process baselines io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id '"10fd513a-9e7c-48d7-aa25-cc0867c91b86"' does not exist: not found at io.stackrox.proto.api.v1.ProcessBaselineServiceGrpc$ProcessBaselineServiceBlockingStub.getProcessBaseline(ProcessBaselineServiceGrpc.java:455) [3 skipped] at services.ProcessBaselineService.getBaselineProcesses(ProcessBaselineService.groovy:141) at services.ProcessBaselineService.getProcessBaseline(ProcessBaselineService.groovy:38) at services.ProcessBaselineService.getProcessBaseline(ProcessBaselineService.groovy) at services.ProcessBaselineService.waitForDeploymentBaselinesDeleted(ProcessBaselineService.groovy:172) at ProcessBaselinesTest.$spock_feature_1_2(ProcessBaselinesTest.groovy:312) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:35:02 | DEBUG | ProcessBaselinesTest | ProcessBaselineService | SR has not found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 10fd513a-9e7c-48d7-aa25-cc0867c91b86, pb-deploymentnginx-delete yet 04:35:02 | WARN | ProcessBaselinesTest | ProcessBaselineService | SR has not found process in baseline for the key in - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 10fd513a-9e7c-48d7-aa25-cc0867c91b86, pb-deploymentnginx-delete 6 seconds 04:35:02 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-delete 04:35:02 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-delete: deployment removed. 04:35:02 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Verify baselines are deleted when their deployment is deleted PASSED ProcessBaselinesTest > Verify removed baseline process not getting added back to baseline after rerun on #deploymentName > Verify removed baseline process not getting added back to baseline after rerun on pb-deploymentnginx-removeprocess STANDARD_OUT 04:35:02 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Verify removed baseline process not getting added back to baseline after rerun on pb-deploymentnginx-removeprocess 04:35:02 | DEBUG | ProcessBaselinesTest | OpenShift | Namespace qa-process-baselines already exists 04:35:02 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-removeprocess 04:35:02 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-removeprocess to start 04:35:02 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-removeprocess's pods: 04:35:02 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-removeprocess-857d57b5b6-rtdjg Container status: [] 04:35:02 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-removeprocess 04:35:02 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42842 found in namespace qa-admission-controller-test. Updating... 04:35:02 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:35:02 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-6rgjq, ready=false. 04:35:02 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-gqxcm, ready=true. 04:35:02 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qhbkl, ready=false. 04:35:02 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-sqbkq, ready=true. 04:35:02 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-gqxcm. 04:35:03 | INFO | | ChaosMonkey | Deleting pod admission-control-7c9bf84889-sqbkq. 04:35:03 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:03 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 6 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1761885268 nanos: 945940121 } 04:35:03 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42883 found in namespace qa-admission-controller-test. Updating... 04:35:04 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:35:04 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-gqxcm, ready=false. 04:35:04 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ljwt9, ready=false. 04:35:04 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qhbkl, ready=false. 04:35:04 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-sqbkq, ready=false. 04:35:04 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-tzjw7, ready=false. 04:35:04 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:05 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42947 found in namespace qa-admission-controller-test. Updating... 04:35:05 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:35:05 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-gqxcm, ready=false. 04:35:05 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ljwt9, ready=false. 04:35:05 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qhbkl, ready=false. 04:35:05 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-sqbkq, ready=false. 04:35:05 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-tzjw7, ready=false. 04:35:05 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:05 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-removeprocess to start 04:35:05 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-removeprocess's pods: 04:35:05 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-removeprocess-857d57b5b6-rtdjg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:35:03Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:35:05 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-removeprocess 04:35:05 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-removeprocess 04:35:05 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-removeprocess with 1 pods 04:35:05 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 476c2530-a402-45a8-8954-771326618084, pb-deploymentnginx-removeprocess within 0s 04:35:05 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 476c2530-a402-45a8-8954-771326618084, pb-deploymentnginx-removeprocess within 0s 04:35:06 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-removeprocess-857d57b5b6-rtdjg is running 04:35:06 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-removeprocess-857d57b5b6-rtdjg: [pwd] 04:35:06 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42971 found in namespace qa-admission-controller-test. Updating... 04:35:06 | DEBUG | | Kubernetes | Command exited with 0 04:35:06 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:35:06 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:35:06 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ljwt9, ready=false. 04:35:06 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qhbkl, ready=false. 04:35:06 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-tzjw7, ready=false. 04:35:06 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 476c2530-a402-45a8-8954-771326618084, pb-deploymentnginx-removeprocess within 0s 04:35:06 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:35:06 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-removeprocess 04:35:06 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-removeprocess: deployment removed. 04:35:06 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Verify removed baseline process not getting added back to baseline after rerun on #deploymentName > Verify removed baseline process not getting added back to baseline after rerun on pb-deploymentnginx-removeprocess PASSED ProcessBaselinesTest > Delete process baselines via API STANDARD_OUT 04:35:06 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Delete process baselines via API 04:35:06 | DEBUG | ProcessBaselinesTest | OpenShift | Namespace qa-process-baselines already exists 04:35:06 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-delete-api 04:35:06 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-delete-api to start 04:35:06 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-delete-api's pods: 04:35:06 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-delete-api-769bf64b9b-m5bhr Container status: [] 04:35:06 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-delete-api 04:35:06 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:07 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 42994 found in namespace qa-admission-controller-test. Updating... 04:35:07 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-ljwt9, ready=false. 04:35:07 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-qhbkl, ready=false. 04:35:07 | INFO | | ChaosMonkey | Encountered pod admission-control-7c9bf84889-tzjw7, ready=false. 04:35:07 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:35:07 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:08 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 7 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1761885268 nanos: 945940121 } 04:35:08 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:09 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-delete-api to start 04:35:09 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-delete-api's pods: 04:35:09 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-delete-api-769bf64b9b-m5bhr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:35:07Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:35:09 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-delete-api 04:35:09 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-delete-api 04:35:09 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-delete-api with 1 pods 04:35:09 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, d33aad34-ccc6-4dbe-b825-136cc65bd39a, pb-deploymentnginx-delete-api within 0s 04:35:09 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, d33aad34-ccc6-4dbe-b825-136cc65bd39a, pb-deploymentnginx-delete-api within 0s 04:35:09 | DEBUG | ProcessBaselinesTest | Helpers | Attempt 1 failed, retrying 04:35:09 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:10 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:11 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:12 | INFO | AdmissionControllerTest | ChaosMonkey | ChaosMonkey: All admission control pod replicas ready: [admission-control-7c9bf84889-ljwt9, admission-control-7c9bf84889-qhbkl, admission-control-7c9bf84889-tzjw7] 04:35:12 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: random-busybox 04:35:12 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify admission controller does not impair cluster operations when unstable PASSED AdmissionControllerTest STANDARD_OUT 04:35:12 | DEBUG | AdmissionControllerTest | Kubernetes | Waiting for namespace qa-admission-controller-test to be deleted 04:35:12 | DEBUG | AdmissionControllerTest | Kubernetes | Retrying in 3... 04:35:12 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:13 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:14 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, d33aad34-ccc6-4dbe-b825-136cc65bd39a, pb-deploymentnginx-delete-api within 0s 04:35:14 | DEBUG | ProcessBaselinesTest | Helpers | Attempt 2 failed, retrying 04:35:14 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:15 | DEBUG | AdmissionControllerTest | Kubernetes | Retrying in 3... 04:35:15 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: Service deleting... 04:35:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: Service deleted 04:35:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-1 04:35:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: deployment removed. 04:35:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: Service deleting... 04:35:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: Service deleted 04:35:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-2 04:35:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: deployment removed. 04:35:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: Service deleting... 04:35:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: Service deleted 04:35:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-3 04:35:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: deployment removed. 04:35:15 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify networking endpoints disappear when process is terminated PASSED ProcessesListeningOnPortsTest > Verify networking endpoint doesn't disappear when port stays open STANDARD_OUT 04:35:15 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify networking endpoint doesn't disappear when port stays open 04:35:16 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:35:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1 service created 04:35:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-1 04:35:16 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:35:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2 service created 04:35:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-2 04:35:16 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:35:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3 service created 04:35:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-3 04:35:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-1 to start 04:35:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-1's pods: 04:35:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-8hcjd Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:35:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-fvvs4 Container status: [ContainerState(running=null, terminated=ContainerStateTerminated(containerID=cri-o://17989ae3e4b8f38131367753ca6859a45ba494d601620a24ce158c2389627dd8, exitCode=143, finishedAt=2025-10-31T04:35:15Z, message=null, reason=Error, signal=null, startedAt=2025-10-31T04:33:16Z, additionalProperties={}), waiting=null, additionalProperties={})] 04:35:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | 0/1 are in the ready state for tcp-connection-target-1 04:35:18 | DEBUG | AdmissionControllerTest | Kubernetes | Retrying in 3... 04:35:18 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap removed. 04:35:18 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | removed declarative configuration configMap 04:35:18 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateCleanupState with 60 retries 04:35:18 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: declarativeHealths.isEmpty() | | | false [id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" error_message: "1 error occurred:\n\t* values: Invalid value: []string(nil): for \'in\', \'notin\' operators, values set can\'t be empty\n\n: invalid arguments" resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1761885308 nanos: 914757755 } , id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" error_message: "1 error occurred:\n\t* resource \"non-existent-resource\" does not exist\n\n: invalid arguments" resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1761885308 nanos: 916044458 } , id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" error_message: "referenced permission set b1201725-2a84-5146-846b-331efdd9c226 does not exist: invalid arguments" resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1761885308 nanos: 918120980 } , id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" error_message: "unable to create backend for provider id ef53ca8f-bcf7-529d-8249-8befd36c8a7b: 404 Not Found: Example Domain

Example Domain

This domain is for use in documentation examples without needing permission. Avoid use in operations.

Learn more

\n" resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1761885309 nanos: 139245257 } , id: "e0664b49-3173-5cd1-a590-53cc9f8a971e" name: "declarative-config-test--notifier in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--notifier" resource_type: NOTIFIER last_timestamp { seconds: 1761885309 nanos: 146513209 } ] Declarative resources should be cleaned up but found: [declarative-config-test--access-scope in config map declarative-configurations, declarative-config-test--permission-set in config map declarative-configurations, declarative-config-test--role in config map declarative-configurations, declarative-config-test--auth-provider in config map declarative-configurations, declarative-config-test--notifier in config map declarative-configurations] 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-1 to start 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-1's pods: 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-8hcjd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:35:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-1 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 3 seconds for k8s deployment tcp-connection-target-1 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-1 with 1 pods 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-2 to start 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-2's pods: 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-2-6f4fbcc974-z9msv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:35:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-2 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target-2 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-2 with 1 pods 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-3 to start 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-3's pods: 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-3-767d5fbfd-chvst Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:35:17Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-3-767d5fbfd-vcgqn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:33:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-3 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target-3 04:35:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-3 with 2 pods 04:35:19 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-1 within 0s 04:35:19 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-2 within 0s 04:35:19 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-3 within 0s 04:35:19 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:19 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, d33aad34-ccc6-4dbe-b825-136cc65bd39a, pb-deploymentnginx-delete-api within 0s 04:35:19 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | ID: d33aad34-ccc6-4dbe-b825-136cc65bd39a 04:35:19 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, d33aad34-ccc6-4dbe-b825-136cc65bd39a, pb-deploymentnginx-delete-api within 0s 04:35:19 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | baselineBeforeDelete processes [/usr/sbin/nginx] 04:35:19 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-delete-api 04:35:19 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-delete-api: deployment removed. 04:35:19 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Delete process baselines via API PASSED ProcessBaselinesTest > Processes come in after baseline deleted by API for #deploymentName > Processes come in after baseline deleted by API for pb-deploymentnginx-post-delete-api STANDARD_OUT 04:35:19 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Processes come in after baseline deleted by API for pb-deploymentnginx-post-delete-api 04:35:19 | DEBUG | ProcessBaselinesTest | OpenShift | Namespace qa-process-baselines already exists 04:35:19 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-post-delete-api 04:35:19 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-post-delete-api to start 04:35:19 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-post-delete-api's pods: 04:35:19 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-post-delete-api-5cdf57d6b6-9mb2g Container status: [] 04:35:19 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-post-delete-api 04:35:20 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:21 | DEBUG | AdmissionControllerTest | Kubernetes | K8s found that namespace qa-admission-controller-test was deleted 04:35:21 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:21 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testsuite 04:35:21 | INFO | AdmissionControllerTest | AdmissionControllerTest | Checking if cluster is healthy after test 04:35:21 | DEBUG | AdmissionControllerTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries Gradle Test Executor 4 STANDARD_OUT 04:35:22 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:22 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-post-delete-api to start 04:35:22 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-post-delete-api's pods: 04:35:22 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-post-delete-api-5cdf57d6b6-9mb2g Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:35:20Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:35:22 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-post-delete-api 04:35:22 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-post-delete-api 04:35:22 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-post-delete-api with 1 pods 04:35:22 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-post-delete-api-5cdf57d6b6-9mb2g is running 04:35:22 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-post-delete-api-5cdf57d6b6-9mb2g: [ls] 04:35:22 | DEBUG | | Kubernetes | Command exited with 0 04:35:22 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:35:22 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: bin boot dev etc home lib lib64 media mnt opt proc root run sbin srv sys tmp usr var Stderr: 04:35:22 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:35:22 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 0 of 10): java.lang.RuntimeException: Baseline objects.Deployment@2ba778a6 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:44f5e024-1699-441a-ab0a-16f440dcc85b:pb-deploymentnginx-post-delete-api" key { deployment_id: "44f5e024-1699-441a-ab0a-16f440dcc85b" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } created { seconds: 1761885322 nanos: 934102392 } stack_rox_locked_timestamp { seconds: 1761885382 nanos: 934102602 } last_update { seconds: 1761885322 nanos: 934102392 } . 04:35:23 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:23 | DEBUG | DeclarativeConfigTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:35:23 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Get ConfigMap declarative-configurations from cluster 04:35:23 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 3s (attempt 0 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null 04:35:24 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:25 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:26 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:26 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 3s (attempt 1 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null 04:35:27 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:28 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:29 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:29 | WARN | DeclarativeConfigTest | DeclarativeConfigTest | Failed to get ConfigMap declarative-configurations from cluster java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null at orchestratormanager.Kubernetes$_getConfigMap_closure66.doCall(Kubernetes.groovy:1809) at orchestratormanager.Kubernetes$_getConfigMap_closure66.call(Kubernetes.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at orchestratormanager.Kubernetes.getConfigMap(Kubernetes.groovy:1806) at DeclarativeConfigTest.outputAdditionalDebugInfo(DeclarativeConfigTest.groovy:895) [1 skipped] at DeclarativeConfigTest.cleanup(DeclarativeConfigTest.groovy:253) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$7(NodeTestTask.java:161) [14 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:161) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:35:29 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Get mounted files from ConfigMap declarative-configurations in central container 04:35:29 | DEBUG | DeclarativeConfigTest | Kubernetes | First container in pod central-795644c465-msqhx is running 04:35:29 | DEBUG | DeclarativeConfigTest | Kubernetes | Exec-ing the following command in pod central-795644c465-msqhx: [ls, -al, /run/stackrox.io/declarative-configuration/declarative-configurations/] 04:35:29 | DEBUG | | Kubernetes | Command exited with 0 04:35:29 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:35:29 | DEBUG | DeclarativeConfigTest | Kubernetes | Command status: SUCCESS Stdout: total 0 drwxrwsrwx. 3 root 4000 59 Oct 31 04:35 . drwxr-xr-t. 4 root root 84 Oct 31 04:25 .. drwxr-sr-x. 2 root 4000 6 Oct 31 04:35 ..2025_10_31_04_35_14.194186756 lrwxrwxrwx. 1 root 4000 31 Oct 31 04:35 ..data -> ..2025_10_31_04_35_14.194186756 Stderr: 04:35:30 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:31 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:32 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:32 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:35:32 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 1 of 10): java.lang.RuntimeException: Baseline objects.Deployment@2ba778a6 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:44f5e024-1699-441a-ab0a-16f440dcc85b:pb-deploymentnginx-post-delete-api" key { deployment_id: "44f5e024-1699-441a-ab0a-16f440dcc85b" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/bin/ls" } auto: true } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1761885322 nanos: 934102392 } stack_rox_locked_timestamp { seconds: 1761885382 nanos: 934102602 } last_update { seconds: 1761885329 nanos: 932270240 } . 04:35:33 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:34 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:34 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap removed. 04:35:34 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateCleanupState with 60 retries 04:35:34 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Ending testcase DeclarativeConfigTest > Check successful creation, update, and deletion of declarative resources PASSED DeclarativeConfigTest STANDARD_OUT 04:35:34 | DEBUG | | Helpers | Caught exception. Retrying in 3s (attempt 0 of 2): io.fabric8.kubernetes.client.KubernetesClientException: Operation: [list] for kind: [Pod] with name: [null] in namespace: [stackrox] failed. DeclarativeConfigTest > Check creating invalid configuration will not work STANDARD_OUT 04:35:34 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Starting testcase: Check creating invalid configuration will not work 04:35:35 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:35:35 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | created declarative configuration configMap c74ce146-397b-42b5-92e4-44a3c7c72eb2 04:35:35 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateExpectedHealthStatus with 60 retries 04:35:35 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: health != null | | null false Expected unhealthy resource 'declarative-config-test--permission-set' not found in health status. Available resources: Config Map sensitive-declarative-configurations, Config Map declarative-configurations 04:35:35 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:36 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:37 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:37 | DEBUG | | Helpers | Caught exception. Retrying in 3s (attempt 1 of 2): io.fabric8.kubernetes.client.KubernetesClientException: Operation: [list] for kind: [Pod] with name: [null] in namespace: [stackrox] failed. 04:35:38 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:39 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:40 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:40 | ERROR | | DeclarativeConfigTest | Failed adding annotation to central java.lang.InterruptedException: null at orchestratormanager.Kubernetes$_getPodsByLabel_closure4.doCall(Kubernetes.groovy:301) [6 skipped] at orchestratormanager.Kubernetes$_getPodsByLabel_closure4.call(Kubernetes.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) ... 16 common frames omitted Wrapped by: java.io.InterruptedIOException: null at orchestratormanager.Kubernetes$_getPodsByLabel_closure4.doCall(Kubernetes.groovy:301) [4 skipped] at orchestratormanager.Kubernetes$_getPodsByLabel_closure4.call(Kubernetes.groovy) ... 15 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Operation: [list] for kind: [Pod] with name: [null] in namespace: [stackrox] failed. at io.fabric8.kubernetes.client.KubernetesClientException.launderThrowable(KubernetesClientException.java:139) at orchestratormanager.Kubernetes$_getPodsByLabel_closure4.doCall(Kubernetes.groovy:301) [3 skipped] at orchestratormanager.Kubernetes$_getPodsByLabel_closure4.call(Kubernetes.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at orchestratormanager.Kubernetes.getPodsByLabel(Kubernetes.groovy:300) at orchestratormanager.Kubernetes.addPodAnnotationByApp(Kubernetes.groovy:364) at DeclarativeConfigTest$1.run(DeclarativeConfigTest.groovy:244) [1 skipped] [6 skipped] 04:35:41 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:42 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:42 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:35:42 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 2 of 10): java.lang.RuntimeException: Baseline objects.Deployment@2ba778a6 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:44f5e024-1699-441a-ab0a-16f440dcc85b:pb-deploymentnginx-post-delete-api" key { deployment_id: "44f5e024-1699-441a-ab0a-16f440dcc85b" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/bin/ls" } auto: true } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1761885322 nanos: 934102392 } stack_rox_locked_timestamp { seconds: 1761885382 nanos: 934102602 } last_update { seconds: 1761885329 nanos: 932270240 } . 04:35:43 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:44 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:45 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap removed. 04:35:45 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | removed declarative configuration configMap 04:35:45 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateCleanupState with 60 retries 04:35:45 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Get ConfigMap declarative-configurations from cluster 04:35:45 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 3s (attempt 0 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null 04:35:48 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 3s (attempt 1 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null 04:35:51 | WARN | DeclarativeConfigTest | DeclarativeConfigTest | Failed to get ConfigMap declarative-configurations from cluster java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null at orchestratormanager.Kubernetes$_getConfigMap_closure66.doCall(Kubernetes.groovy:1809) at orchestratormanager.Kubernetes$_getConfigMap_closure66.call(Kubernetes.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at orchestratormanager.Kubernetes.getConfigMap(Kubernetes.groovy:1806) at DeclarativeConfigTest.outputAdditionalDebugInfo(DeclarativeConfigTest.groovy:895) [1 skipped] at DeclarativeConfigTest.cleanup(DeclarativeConfigTest.groovy:253) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$7(NodeTestTask.java:161) [14 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:161) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:35:51 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Get mounted files from ConfigMap declarative-configurations in central container 04:35:51 | DEBUG | DeclarativeConfigTest | Kubernetes | First container in pod central-795644c465-msqhx is running 04:35:51 | DEBUG | DeclarativeConfigTest | Kubernetes | Exec-ing the following command in pod central-795644c465-msqhx: [ls, -al, /run/stackrox.io/declarative-configuration/declarative-configurations/] 04:35:51 | DEBUG | | Kubernetes | Command exited with 0 04:35:51 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:35:51 | DEBUG | DeclarativeConfigTest | Kubernetes | Command status: SUCCESS Stdout: total 0 drwxrwsrwx. 3 root 4000 60 Oct 31 04:35 . drwxr-xr-t. 4 root root 84 Oct 31 04:25 .. drwxr-sr-x. 2 root 4000 6 Oct 31 04:35 ..2025_10_31_04_35_40.3334721121 lrwxrwxrwx. 1 root 4000 32 Oct 31 04:35 ..data -> ..2025_10_31_04_35_40.3334721121 Stderr: 04:35:52 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:35:52 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 3 of 10): java.lang.RuntimeException: Baseline objects.Deployment@2ba778a6 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:44f5e024-1699-441a-ab0a-16f440dcc85b:pb-deploymentnginx-post-delete-api" key { deployment_id: "44f5e024-1699-441a-ab0a-16f440dcc85b" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/bin/ls" } auto: true } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1761885322 nanos: 934102392 } stack_rox_locked_timestamp { seconds: 1761885382 nanos: 934102602 } last_update { seconds: 1761885329 nanos: 932270240 } . 04:35:56 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap removed. 04:35:56 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateCleanupState with 60 retries 04:35:56 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Ending testcase DeclarativeConfigTest > Check creating invalid configuration will not work PASSED DeclarativeConfigTest > Check orphaned declarative resources are correctly handled STANDARD_OUT 04:35:56 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Starting testcase: Check orphaned declarative resources are correctly handled 04:35:56 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:35:56 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | created declarative configuration configMap 81f5d786-890e-4d12-8453-6feedafa195e 04:35:56 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateExpectedHealthStatus with 60 retries 04:35:56 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: health != null | | null false Expected resource 'declarative-config-test--permission-set' not found in health status. Available resources: Config Map sensitive-declarative-configurations, Config Map declarative-configurations 04:36:01 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:36:01 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | trying to remove the declarative permission set with configMap 81f5d786-890e-4d12-8453-6feedafa195e 04:36:01 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage().contains("referenced by another object") | | | | "" false id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1761885358 nanos: 930696603 } 04:36:03 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:36:03 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 4 of 10): java.lang.RuntimeException: Baseline objects.Deployment@2ba778a6 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:44f5e024-1699-441a-ab0a-16f440dcc85b:pb-deploymentnginx-post-delete-api" key { deployment_id: "44f5e024-1699-441a-ab0a-16f440dcc85b" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/bin/ls" } auto: true } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1761885322 nanos: 934102392 } stack_rox_locked_timestamp { seconds: 1761885382 nanos: 934102602 } last_update { seconds: 1761885329 nanos: 932270240 } . 04:36:06 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:36:06 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | restored a valid declarative permission set with configMap 81f5d786-890e-4d12-8453-6feedafa195e 04:36:06 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() == "" | | | | | false | | 105 differences (0% similarity) | | (cannot delete permission set in use by role "declarative-config-test--role": referenced by another object) | | (---------------------------------------------------------------------------------------------------------) | cannot delete permission set in use by role "declarative-config-test--role": referenced by another object id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" error_message: "cannot delete permission set in use by role \"declarative-config-test--role\": referenced by another object" resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1761885363 nanos: 998627943 } 04:36:11 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:36:11 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | trying to remove the declarative access scope with configMap 81f5d786-890e-4d12-8453-6feedafa195e 04:36:11 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage().contains("referenced by another object") | | | | "" false id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1761885368 nanos: 972399757 } 04:36:13 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:36:13 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 5 of 10): java.lang.RuntimeException: Baseline objects.Deployment@2ba778a6 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:44f5e024-1699-441a-ab0a-16f440dcc85b:pb-deploymentnginx-post-delete-api" key { deployment_id: "44f5e024-1699-441a-ab0a-16f440dcc85b" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } elements { element { process_name: "/bin/ls" } auto: true } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1761885322 nanos: 934102392 } stack_rox_locked_timestamp { seconds: 1761885382 nanos: 934102602 } last_update { seconds: 1761885329 nanos: 932270240 } . 04:36:16 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:36:16 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | restored a valid declarative access scope with configMap 81f5d786-890e-4d12-8453-6feedafa195e 04:36:16 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() == "" | | | | | false | | 103 differences (0% similarity) | | (cannot delete access scope in use by role "declarative-config-test--role": referenced by another object) | | (-------------------------------------------------------------------------------------------------------) | cannot delete access scope in use by role "declarative-config-test--role": referenced by another object id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" error_message: "cannot delete access scope in use by role \"declarative-config-test--role\": referenced by another object" resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1761885373 nanos: 993349455 } 04:36:22 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | found auth provider ef53ca8f-bcf7-529d-8249-8befd36c8a7b for declarative-config-test--auth-provider 04:36:22 | DEBUG | DeclarativeConfigTest | Helpers | Calling services.GroupService.createGroup with 3 retries 04:36:22 | DEBUG | DeclarativeConfigTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:36:22 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | found newly created auth provider group io.stackrox.authz.group.53bcb4ba-ab61-44c4-90a1-3b0f353746a6 04:36:22 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:36:22 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | trying to remove the declarative role with configMap 81f5d786-890e-4d12-8453-6feedafa195e 04:36:22 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: roleHealth.getErrorMessage().contains("is referenced by groups") | | | | "" false id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1761885378 nanos: 922750974 } 04:36:23 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:36:23 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:36:23 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:36:23 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 0 of 10): java.lang.RuntimeException: Baseline objects.Deployment@2ba778a6 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:44f5e024-1699-441a-ab0a-16f440dcc85b:pb-deploymentnginx-post-delete-api" key { deployment_id: "44f5e024-1699-441a-ab0a-16f440dcc85b" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } created { seconds: 1761885322 nanos: 934102392 } stack_rox_locked_timestamp { seconds: 1761885443 nanos: 64299885 } last_update { seconds: 1761885383 nanos: 64300725 } . 04:36:27 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:36:27 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | restored a valid declarative role with configMap 81f5d786-890e-4d12-8453-6feedafa195e 04:36:27 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: roleHealth.getErrorMessage() == "" | | | | | false | | 186 differences (0% similarity) | | (role declarative-config-test--role is referenced by groups [io.stackrox.authz.group.53bcb4ba-ab61-44c4-90a1-3b0f353746a6] in auth providers, ensure all references to the role are removed) | | (------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------) | role declarative-config-test--role is referenced by groups [io.stackrox.authz.group.53bcb4ba-ab61-44c4-90a1-3b0f353746a6] in auth providers, ensure all references to the role are removed id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" error_message: "role declarative-config-test--role is referenced by groups [io.stackrox.authz.group.53bcb4ba-ab61-44c4-90a1-3b0f353746a6] in auth providers, ensure all references to the role are removed" resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1761885383 nanos: 968839725 } 04:36:32 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:36:32 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | trying to remove the declarative auth provider with configMap 81f5d786-890e-4d12-8453-6feedafa195e 04:36:32 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateExpectedHealthStatus with 60 retries 04:36:32 | DEBUG | DeclarativeConfigTest | Helpers | Calling services.GroupService.getGroup with 3 retries 04:36:32 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: thrown | false Expected imperative group to be deleted when auth provider is removed, but group still exists 04:36:33 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:36:33 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 1 of 10): java.lang.RuntimeException: Baseline objects.Deployment@2ba778a6 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:44f5e024-1699-441a-ab0a-16f440dcc85b:pb-deploymentnginx-post-delete-api" key { deployment_id: "44f5e024-1699-441a-ab0a-16f440dcc85b" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } created { seconds: 1761885322 nanos: 934102392 } stack_rox_locked_timestamp { seconds: 1761885443 nanos: 64299885 } last_update { seconds: 1761885383 nanos: 64300725 } . 04:36:37 | DEBUG | DeclarativeConfigTest | Helpers | Calling services.GroupService.getGroup with 3 retries 04:36:37 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: NOT_FOUND: could not find group io.stackrox.authz.group.53bcb4ba-ab61-44c4-90a1-3b0f353746a6 04:36:38 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: NOT_FOUND: could not find group io.stackrox.authz.group.53bcb4ba-ab61-44c4-90a1-3b0f353746a6 04:36:39 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: NOT_FOUND: could not find group io.stackrox.authz.group.53bcb4ba-ab61-44c4-90a1-3b0f353746a6 04:36:43 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:36:43 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 2 of 10): java.lang.RuntimeException: Baseline objects.Deployment@2ba778a6 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:44f5e024-1699-441a-ab0a-16f440dcc85b:pb-deploymentnginx-post-delete-api" key { deployment_id: "44f5e024-1699-441a-ab0a-16f440dcc85b" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } created { seconds: 1761885322 nanos: 934102392 } stack_rox_locked_timestamp { seconds: 1761885443 nanos: 64299885 } last_update { seconds: 1761885383 nanos: 64300725 } . 04:36:45 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap removed. 04:36:45 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | removed declarative configuration configMap 04:36:45 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateCleanupState with 60 retries 04:36:45 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Get ConfigMap declarative-configurations from cluster 04:36:45 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 3s (attempt 0 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null 04:36:48 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 3s (attempt 1 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null 04:36:50 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: Service deleting... 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: Service deleted 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-1 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: deployment removed. 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: Service deleting... 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: Service deleted 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-2 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: deployment removed. 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: Service deleting... 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: Service deleted 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-3 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: deployment removed. 04:36:50 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify networking endpoint doesn't disappear when port stays open PASSED ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported STANDARD_OUT 04:36:50 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify listening endpoints for collector are reported 04:36:50 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:50 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported PASSED ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported with pagination: #limit - #offset > Verify listening endpoints for collector are reported with pagination: 1 - 0 STANDARD_OUT 04:36:50 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify listening endpoints for collector are reported with pagination: 1 - 0 04:36:50 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:50 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported with pagination: #limit - #offset > Verify listening endpoints for collector are reported with pagination: 1 - 0 PASSED ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported with pagination: #limit - #offset > Verify listening endpoints for collector are reported with pagination: 1 - 1 STANDARD_OUT 04:36:50 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify listening endpoints for collector are reported with pagination: 1 - 1 04:36:50 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:50 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported with pagination: #limit - #offset > Verify listening endpoints for collector are reported with pagination: 1 - 1 PASSED ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported with pagination: #limit - #offset > Verify listening endpoints for collector are reported with pagination: 2 - 0 STANDARD_OUT 04:36:50 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify listening endpoints for collector are reported with pagination: 2 - 0 04:36:50 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:50 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported with pagination: #limit - #offset > Verify listening endpoints for collector are reported with pagination: 2 - 0 PASSED ProcessesListeningOnPortsTest STANDARD_OUT 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for namespace qa-plop to be deleted 04:36:50 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:36:51 | WARN | DeclarativeConfigTest | DeclarativeConfigTest | Failed to get ConfigMap declarative-configurations from cluster java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null at orchestratormanager.Kubernetes$_getConfigMap_closure66.doCall(Kubernetes.groovy:1809) at orchestratormanager.Kubernetes$_getConfigMap_closure66.call(Kubernetes.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at orchestratormanager.Kubernetes.getConfigMap(Kubernetes.groovy:1806) at DeclarativeConfigTest.outputAdditionalDebugInfo(DeclarativeConfigTest.groovy:895) [1 skipped] at DeclarativeConfigTest.cleanup(DeclarativeConfigTest.groovy:253) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$7(NodeTestTask.java:161) [14 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:161) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:36:51 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Get mounted files from ConfigMap declarative-configurations in central container 04:36:51 | DEBUG | DeclarativeConfigTest | Kubernetes | First container in pod central-795644c465-msqhx is running 04:36:51 | DEBUG | DeclarativeConfigTest | Kubernetes | Exec-ing the following command in pod central-795644c465-msqhx: [ls, -al, /run/stackrox.io/declarative-configuration/declarative-configurations/] 04:36:51 | DEBUG | | Kubernetes | Command exited with 0 04:36:51 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:36:51 | DEBUG | DeclarativeConfigTest | Kubernetes | Command status: SUCCESS Stdout: total 0 drwxrwsrwx. 3 root 4000 60 Oct 31 04:36 . drwxr-xr-t. 4 root root 84 Oct 31 04:25 .. drwxr-sr-x. 2 root 4000 6 Oct 31 04:36 ..2025_10_31_04_36_40.1809083184 lrwxrwxrwx. 1 root 4000 32 Oct 31 04:36 ..data -> ..2025_10_31_04_36_40.1809083184 Stderr: 04:36:53 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:36:53 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 3 of 10): java.lang.RuntimeException: Baseline objects.Deployment@2ba778a6 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:44f5e024-1699-441a-ab0a-16f440dcc85b:pb-deploymentnginx-post-delete-api" key { deployment_id: "44f5e024-1699-441a-ab0a-16f440dcc85b" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } created { seconds: 1761885322 nanos: 934102392 } stack_rox_locked_timestamp { seconds: 1761885443 nanos: 64299885 } last_update { seconds: 1761885383 nanos: 64300725 } . 04:36:53 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:36:56 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:36:56 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap removed. 04:36:56 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateCleanupState with 60 retries 04:36:56 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Ending testcase DeclarativeConfigTest > Check orphaned declarative resources are correctly handled PASSED DeclarativeConfigTest STANDARD_OUT 04:36:56 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Ending testsuite 04:36:56 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Checking if cluster is healthy after test 04:36:56 | DEBUG | DeclarativeConfigTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries Gradle Test Executor 4 STANDARD_OUT 04:36:59 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:37:02 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:37:03 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:37:03 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 4 of 10): java.lang.RuntimeException: Baseline objects.Deployment@2ba778a6 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:44f5e024-1699-441a-ab0a-16f440dcc85b:pb-deploymentnginx-post-delete-api" key { deployment_id: "44f5e024-1699-441a-ab0a-16f440dcc85b" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } created { seconds: 1761885322 nanos: 934102392 } stack_rox_locked_timestamp { seconds: 1761885443 nanos: 64299885 } last_update { seconds: 1761885383 nanos: 64300725 } . 04:37:05 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:37:08 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:37:11 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:37:13 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:37:13 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 5 of 10): java.lang.RuntimeException: Baseline objects.Deployment@2ba778a6 is still in observation. Baseline is id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:44f5e024-1699-441a-ab0a-16f440dcc85b:pb-deploymentnginx-post-delete-api" key { deployment_id: "44f5e024-1699-441a-ab0a-16f440dcc85b" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } created { seconds: 1761885322 nanos: 934102392 } stack_rox_locked_timestamp { seconds: 1761885443 nanos: 64299885 } last_update { seconds: 1761885383 nanos: 64300725 } . 04:37:14 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:37:17 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:37:20 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:37:23 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-process-baselines, 44f5e024-1699-441a-ab0a-16f440dcc85b, pb-deploymentnginx-post-delete-api within 0s 04:37:23 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Process Baseline before pwd: id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa-process-baselines:44f5e024-1699-441a-ab0a-16f440dcc85b:pb-deploymentnginx-post-delete-api" key { deployment_id: "44f5e024-1699-441a-ab0a-16f440dcc85b" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-process-baselines" } created { seconds: 1761885322 nanos: 934102392 } stack_rox_locked_timestamp { seconds: 1761885443 nanos: 64299885 } last_update { seconds: 1761885383 nanos: 64300725 } 04:37:23 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:37:26 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:37:29 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:37:32 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:37:33 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-post-delete-api-5cdf57d6b6-9mb2g is running 04:37:33 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-post-delete-api-5cdf57d6b6-9mb2g: [pwd] 04:37:33 | DEBUG | | Kubernetes | Command exited with 0 04:37:33 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:37:33 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:37:35 | DEBUG | ProcessesListeningOnPorts | Kubernetes | K8s found that namespace qa-plop was deleted 04:37:35 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for namespace qa-plop to be deleted 04:37:35 | DEBUG | ProcessesListeningOnPorts | Kubernetes | K8s found that namespace qa-plop was deleted 04:37:35 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testsuite 04:37:35 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Checking if cluster is healthy after test 04:37:35 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries 04:37:36 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Cleaning up deployment: objects.Deployment@2ba778a6 04:37:36 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-post-delete-api 04:37:36 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-post-delete-api: deployment removed. 04:37:36 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Processes come in after baseline deleted by API for #deploymentName > Processes come in after baseline deleted by API for pb-deploymentnginx-post-delete-api PASSED ProcessBaselinesTest STANDARD_OUT 04:37:36 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for namespace qa-process-baselines to be deleted 04:37:36 | DEBUG | ProcessBaselinesTest | Kubernetes | Retrying in 3... 04:37:39 | DEBUG | ProcessBaselinesTest | Kubernetes | Retrying in 3... 04:37:42 | DEBUG | ProcessBaselinesTest | Kubernetes | Retrying in 3... 04:37:45 | DEBUG | ProcessBaselinesTest | Kubernetes | K8s found that namespace qa-process-baselines was deleted 04:37:45 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testsuite 04:37:45 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Checking if cluster is healthy after test 04:37:45 | DEBUG | ProcessBaselinesTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries 04:37:45 | INFO | | BaseSpecification | Performing global shutdown 04:37:45 | INFO | | RoleService | Deleted role: Test Automation Role - 15603 and permission set 04:37:45 | INFO | | BaseSpecification | Removing core image registry integration 04:37:45 | DEBUG | | ImageIntegrationService | Image integration deleted: 3cf81b31-bf9d-4982-b525-275e5e470e03 > Task :testRest AdmissionControllerNoImageScanTest > Verify Admission Controller Behavior for No Image Scans Policy SKIPPED AttemptedAlertsTest STANDARD_OUT 04:37:49 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testsuite 04:37:49 | INFO | AttemptedAlertsTest | BaseSpecification | Performing global setup 04:37:49 | DEBUG | AttemptedAlertsTest | Kubernetes | quay: secret created. 04:37:50 | DEBUG | AttemptedAlertsTest | Kubernetes | public-dockerhub: secret created. 04:37:50 | DEBUG | AttemptedAlertsTest | Kubernetes | gcr-image-pull-secret: secret created. 04:37:50 | DEBUG | AttemptedAlertsTest | Kubernetes | redhat-image-pull-secret: secret created. 04:37:50 | DEBUG | AttemptedAlertsTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:37:50 | INFO | AttemptedAlertsTest | BaseSpecification | Testing against: 04:37:50 | INFO | AttemptedAlertsTest | BaseSpecification | version: "4.10.x-207-g071f40eed6" build_flavor: "development" license_status: VALID 04:37:51 | INFO | AttemptedAlertsTest | BaseSpecification | isGKE: false 04:37:51 | INFO | AttemptedAlertsTest | BaseSpecification | isEKS: false 04:37:51 | INFO | AttemptedAlertsTest | BaseSpecification | isOpenShift4: true 04:37:51 | INFO | AttemptedAlertsTest | BaseSpecification | testTarget: test 04:37:51 | INFO | AttemptedAlertsTest | BaseSpecification | Adding core image registry integration 04:37:51 | DEBUG | AttemptedAlertsTest | ImageIntegrationService | Integration tested: core quay 04:37:51 | DEBUG | AttemptedAlertsTest | ImageIntegrationService | Integration created: core quay: bd5c8cbf-1cf1-4453-9716-c4faddd147fc 04:37:51 | DEBUG | AttemptedAlertsTest | ImageIntegrationService | Integration found after creation: core quay: bd5c8cbf-1cf1-4453-9716-c4faddd147fc 04:37:51 | DEBUG | AttemptedAlertsTest | OpenShift | Namespace qa already exists AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: no create enforce; policy enforce STANDARD_OUT 04:37:52 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment create: no create enforce; policy enforce 04:38:02 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:38:07 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-1 04:38:07 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:38:10 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:38:11 | INFO | AttemptedAlertsTest | Services | violation size is: 1 04:38:11 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 3 seconds 04:38:11 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:38:11 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: no create enforce; policy enforce PASSED AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: create enforce; policy enforce STANDARD_OUT 04:38:11 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment create: create enforce; policy enforce 04:38:21 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:38:26 | WARN | AttemptedAlertsTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AttemptedAlertsTest.$spock_feature_1_0(AttemptedAlertsTest.groovy:124) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:38:26 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:38:26 | INFO | AttemptedAlertsTest | Services | violation size is: 1 04:38:26 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:38:26 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:38:26 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: create enforce; policy enforce PASSED AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: create enforce; policy enforce; 2nd attempt STANDARD_OUT 04:38:26 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment create: create enforce; policy enforce; 2nd attempt 04:38:36 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:38:42 | WARN | AttemptedAlertsTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AttemptedAlertsTest.$spock_feature_1_0(AttemptedAlertsTest.groovy:124) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:38:42 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:38:42 | INFO | AttemptedAlertsTest | Services | violation size is: 2 04:38:42 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:38:42 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:38:42 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: create enforce; policy enforce; 2nd attempt PASSED AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: no create enforce; policy enforce; 2nd attempt STANDARD_OUT 04:38:42 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment create: no create enforce; policy enforce; 2nd attempt 04:38:52 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:38:57 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-2 04:38:57 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:38:57 | INFO | AttemptedAlertsTest | Services | violation size is: 3 04:38:57 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:38:57 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:38:57 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: no create enforce; policy enforce; 2nd attempt PASSED AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: no enforcement STANDARD_OUT 04:38:57 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment create: no enforcement 04:39:08 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to have no enforcement actions 04:39:13 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-3 04:39:13 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:39:13 | INFO | AttemptedAlertsTest | Services | violation size is: 1 04:39:13 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:39:13 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:39:13 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: no enforcement PASSED AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: create enforce; no policy enforce STANDARD_OUT 04:39:13 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment create: create enforce; no policy enforce 04:39:23 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to have no enforcement actions 04:39:28 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-4 04:39:28 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:39:28 | INFO | AttemptedAlertsTest | Services | violation size is: 1 04:39:28 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:39:28 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:39:28 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: create enforce; no policy enforce PASSED AttemptedAlertsTest > Verify attempted alerts on deployment updates: #desc > Verify attempted alerts on deployment updates: update enforce; policy enforce STANDARD_OUT 04:39:28 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment updates: update enforce; policy enforce 04:39:29 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-5 04:39:39 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:39:44 | DEBUG | AttemptedAlertsTest | Kubernetes | Deployment attempted-alerts-dep-5 with version 44959 found in namespace qa. Updating... 04:39:44 | WARN | AttemptedAlertsTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: PUT at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments/attempted-alerts-dep-5. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: PUT at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments/attempted-alerts-dep-5. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.replace(CreateOrReplaceHelper.java:74) [10 skipped] at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:66) at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy:212) at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy) at AttemptedAlertsTest.$spock_feature_1_1(AttemptedAlertsTest.groovy:204) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:39:44 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:39:44 | INFO | AttemptedAlertsTest | Services | violation size is: 1 04:39:44 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:39:44 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:39:44 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment updates: #desc > Verify attempted alerts on deployment updates: update enforce; policy enforce PASSED AttemptedAlertsTest > Verify attempted alerts on deployment updates: #desc > Verify attempted alerts on deployment updates: update enforce; policy enforce; 2nd attempt STANDARD_OUT 04:39:44 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment updates: update enforce; policy enforce; 2nd attempt 04:39:44 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-5 04:39:54 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:40:00 | DEBUG | AttemptedAlertsTest | Kubernetes | Deployment attempted-alerts-dep-5 with version 45040 found in namespace qa. Updating... 04:40:00 | WARN | AttemptedAlertsTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: PUT at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments/attempted-alerts-dep-5. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: PUT at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments/attempted-alerts-dep-5. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.replace(CreateOrReplaceHelper.java:74) [10 skipped] at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:66) at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy:212) at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy) at AttemptedAlertsTest.$spock_feature_1_1(AttemptedAlertsTest.groovy:204) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:40:00 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:40:00 | INFO | AttemptedAlertsTest | Services | violation size is: 2 04:40:00 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:40:00 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:40:00 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment updates: #desc > Verify attempted alerts on deployment updates: update enforce; policy enforce; 2nd attempt PASSED AttemptedAlertsTest > Verify attempted alerts on deployment updates: #desc > Verify attempted alerts on deployment updates: no update enforce; policy enforce STANDARD_OUT 04:40:00 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment updates: no update enforce; policy enforce 04:40:00 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-5 04:40:10 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:40:15 | DEBUG | AttemptedAlertsTest | Kubernetes | Deployment attempted-alerts-dep-5 with version 45109 found in namespace qa. Updating... 04:40:15 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-5 04:40:15 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:40:15 | INFO | AttemptedAlertsTest | Services | violation size is: 3 04:40:15 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:40:15 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:40:16 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment updates: #desc > Verify attempted alerts on deployment updates: no update enforce; policy enforce PASSED AttemptedAlertsTest STANDARD_OUT 04:40:16 | DEBUG | AttemptedAlertsTest | Kubernetes | Removed the deployment: attempted-alerts-dep-1 04:40:16 | DEBUG | AttemptedAlertsTest | Kubernetes | Removed the deployment: attempted-alerts-dep-2 04:40:16 | DEBUG | AttemptedAlertsTest | Kubernetes | Removed the deployment: attempted-alerts-dep-3 04:40:16 | DEBUG | AttemptedAlertsTest | Kubernetes | Removed the deployment: attempted-alerts-dep-4 04:40:16 | DEBUG | AttemptedAlertsTest | Kubernetes | Removed the deployment: attempted-alerts-dep-5 04:40:16 | DEBUG | AttemptedAlertsTest | Kubernetes | Removed the deployment: attempted-alerts-dep-6 04:40:16 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:40:16 | INFO | AttemptedAlertsTest | Services | violation size is: 4 04:40:16 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:40:16 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:40:16 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:40:16 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:40:16 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:40:16 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:40:16 | INFO | AttemptedAlertsTest | Services | Failed to trigger Kubernetes Actions: Exec into Pod after waiting 0 seconds 04:40:16 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testsuite 04:40:16 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Checking if cluster is healthy after test 04:40:16 | DEBUG | AttemptedAlertsTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries AuditLogAlertsTest STANDARD_OUT 04:40:16 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testsuite AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: CREATE - SECRETS STANDARD_OUT 04:40:16 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify Audit Log Event Source Policies Trigger: CREATE - SECRETS 04:40:21 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez8fcdb907-6301-444f-a845-f74146e1b03d: Secret created. 04:40:26 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez8fcdb907-6301-444f-a845-f74146e1b03d: Secret removed. 04:40:26 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:40:26 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:40:26 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-CREATE-SECRETS triggered after waiting 0 seconds 04:40:26 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: CREATE - SECRETS PASSED AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: GET - SECRETS STANDARD_OUT 04:40:26 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify Audit Log Event Source Policies Trigger: GET - SECRETS 04:40:32 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez2a70173d-0710-49a9-b1f9-17c88f414a3d: Secret created. 04:40:37 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez2a70173d-0710-49a9-b1f9-17c88f414a3d: Secret removed. 04:40:37 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:40:37 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:40:37 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-GET-SECRETS triggered after waiting 0 seconds 04:40:37 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: GET - SECRETS PASSED AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: DELETE - SECRETS STANDARD_OUT 04:40:37 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify Audit Log Event Source Policies Trigger: DELETE - SECRETS 04:40:42 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rezd65006f0-82a0-4bb8-ae6c-27c2ed742f85: Secret created. 04:40:47 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rezd65006f0-82a0-4bb8-ae6c-27c2ed742f85: Secret removed. 04:40:47 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:40:47 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:40:47 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-DELETE-SECRETS triggered after waiting 0 seconds 04:40:47 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: DELETE - SECRETS PASSED AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: CREATE - CONFIGMAPS STANDARD_OUT 04:40:47 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify Audit Log Event Source Policies Trigger: CREATE - CONFIGMAPS 04:40:52 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez467102a0-ccd5-4d75-929c-bfdcbfe32afb: ConfigMap created. 04:40:57 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez467102a0-ccd5-4d75-929c-bfdcbfe32afb: ConfigMap removed. 04:40:57 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:40:57 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:40:57 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-CREATE-CONFIGMAPS triggered after waiting 0 seconds 04:40:58 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: CREATE - CONFIGMAPS PASSED AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: GET - CONFIGMAPS STANDARD_OUT 04:40:58 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify Audit Log Event Source Policies Trigger: GET - CONFIGMAPS 04:41:03 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez2ed7e870-b6fe-49d3-9687-e51e1cdc1ced: ConfigMap created. 04:41:08 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez2ed7e870-b6fe-49d3-9687-e51e1cdc1ced: ConfigMap removed. 04:41:08 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:41:08 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:41:08 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-GET-CONFIGMAPS triggered after waiting 0 seconds 04:41:08 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: GET - CONFIGMAPS PASSED AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: DELETE - CONFIGMAPS STANDARD_OUT 04:41:08 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify Audit Log Event Source Policies Trigger: DELETE - CONFIGMAPS 04:41:13 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-reza65b7308-c644-42fe-a500-f8987d354e3e: ConfigMap created. 04:41:18 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-reza65b7308-c644-42fe-a500-f8987d354e3e: ConfigMap removed. 04:41:18 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:41:18 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:41:18 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-DELETE-CONFIGMAPS triggered after waiting 0 seconds 04:41:18 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: DELETE - CONFIGMAPS PASSED AuditLogAlertsTest > Verify collection continues when it is disabled and then re-enabled STANDARD_OUT 04:41:18 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify collection continues when it is disabled and then re-enabled 04:41:23 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rezf9160672-7b1c-4299-9a4f-cffb123cde6c: ConfigMap created. 04:41:28 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rezf9160672-7b1c-4299-9a4f-cffb123cde6c: ConfigMap removed. 04:41:28 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:41:29 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:41:29 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-GET-CONFIGMAPS triggered after waiting 0 seconds 04:41:29 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:41:39 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rezf9160672-7b1c-4299-9a4f-cffb123cde6c-2: ConfigMap created. 04:41:44 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rezf9160672-7b1c-4299-9a4f-cffb123cde6c-2: ConfigMap removed. 04:41:44 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:41:44 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:41:44 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-GET-CONFIGMAPS triggered after waiting 0 seconds 04:41:44 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify collection continues when it is disabled and then re-enabled PASSED AuditLogAlertsTest > Verify collection stops when feature is is disabled STANDARD_OUT 04:41:44 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify collection stops when feature is is disabled 04:41:49 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez2e4816d6-34ec-4a68-b3b2-b77da3ea61b0: ConfigMap created. 04:41:54 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez2e4816d6-34ec-4a68-b3b2-b77da3ea61b0: ConfigMap removed. 04:41:54 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:41:57 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:00 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:03 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:06 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:09 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:12 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:15 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:18 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:21 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:24 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:27 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:30 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:33 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:36 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:39 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:42 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:45 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:48 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:51 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:55 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:55 | INFO | AuditLogAlertsTest | Services | Failed to trigger e2e-test-detect-GET-CONFIGMAPS after waiting 60 seconds 04:42:55 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify collection stops when feature is is disabled PASSED AuditLogAlertsTest STANDARD_OUT 04:42:55 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testsuite 04:42:55 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Checking if cluster is healthy after test 04:42:55 | DEBUG | AuditLogAlertsTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries AuditScrubbingTest STANDARD_OUT 04:42:55 | INFO | AuditScrubbingTest | AuditScrubbingTest | Starting testsuite 04:42:55 | DEBUG | AuditScrubbingTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries AuditScrubbingTest > Verify that audit log entry (#scenario) for ExchangeToken does not contain sensitive data > Verify that audit log entry (invalid basic auth password) for ExchangeToken does not contain sensitive data STANDARD_OUT 04:42:58 | INFO | AuditScrubbingTest | AuditScrubbingTest | Starting testcase: Verify that audit log entry (invalid basic auth password) for ExchangeToken does not contain sensitive data 04:42:58 | INFO | AuditScrubbingTest | AuditScrubbingTest | Ending testcase AuditScrubbingTest > Verify that audit log entry (#scenario) for ExchangeToken does not contain sensitive data > Verify that audit log entry (invalid basic auth password) for ExchangeToken does not contain sensitive data PASSED AuditScrubbingTest > Verify that audit log entry (#scenario) for ExchangeToken does not contain sensitive data > Verify that audit log entry (valid basic auth credentials) for ExchangeToken does not contain sensitive data STANDARD_OUT 04:42:58 | INFO | AuditScrubbingTest | AuditScrubbingTest | Starting testcase: Verify that audit log entry (valid basic auth credentials) for ExchangeToken does not contain sensitive data 04:42:58 | INFO | AuditScrubbingTest | AuditScrubbingTest | Ending testcase AuditScrubbingTest > Verify that audit log entry (#scenario) for ExchangeToken does not contain sensitive data > Verify that audit log entry (valid basic auth credentials) for ExchangeToken does not contain sensitive data PASSED AuditScrubbingTest STANDARD_OUT 04:42:58 | INFO | AuditScrubbingTest | AuditScrubbingTest | Ending testsuite 04:42:58 | INFO | AuditScrubbingTest | AuditScrubbingTest | Checking if cluster is healthy after test 04:42:58 | DEBUG | AuditScrubbingTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries AuthServiceTest STANDARD_OUT 04:42:59 | INFO | AuthServiceTest | AuthServiceTest | Starting testsuite AuthServiceTest > Verify response for basic auth STANDARD_OUT 04:42:59 | INFO | AuthServiceTest | AuthServiceTest | Starting testcase: Verify response for basic auth 04:42:59 | INFO | AuthServiceTest | AuthServiceTest | Ending testcase AuthServiceTest > Verify response for basic auth PASSED AuthServiceTest > Verify response for auth token STANDARD_OUT 04:42:59 | INFO | AuthServiceTest | AuthServiceTest | Starting testcase: Verify response for auth token 04:42:59 | INFO | AuthServiceTest | AuthServiceTest | Ending testcase AuthServiceTest > Verify response for auth token PASSED AuthServiceTest STANDARD_OUT 04:42:59 | INFO | AuthServiceTest | AuthServiceTest | Ending testsuite 04:42:59 | INFO | AuthServiceTest | AuthServiceTest | Checking if cluster is healthy after test 04:42:59 | DEBUG | AuthServiceTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries AutocompleteTest STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testsuite AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject:system:auth [] system:authenticated STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify Autocomplete: Subject:system:auth [] system:authenticated 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject:system:auth [] system:authenticated PASSED AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject:system:auth [SUBJECTS] system:authenticated STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify Autocomplete: Subject:system:auth [SUBJECTS] system:authenticated 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject:system:auth [SUBJECTS] system:authenticated PASSED AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject Kind:GROUP [] GROUP STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify Autocomplete: Subject Kind:GROUP [] GROUP 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject Kind:GROUP [] GROUP PASSED AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject Kind:group [] GROUP STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify Autocomplete: Subject Kind:group [] GROUP 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject Kind:group [] GROUP PASSED AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject Kind:gr [] GROUP STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify Autocomplete: Subject Kind:gr [] GROUP 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject Kind:gr [] GROUP PASSED AutocompleteTest > Verify #category search options contains #options > Verify ALERTS search options contains [Deployment, Policy] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify ALERTS search options contains [Deployment, Policy] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify ALERTS search options contains [Deployment, Policy] PASSED AutocompleteTest > Verify #category search options contains #options > Verify DEPLOYMENTS search options contains [Deployment, Process Name, Image Tag, Dockerfile Instruction Keyword, CVE, Component] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify DEPLOYMENTS search options contains [Deployment, Process Name, Image Tag, Dockerfile Instruction Keyword, CVE, Component] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify DEPLOYMENTS search options contains [Deployment, Process Name, Image Tag, Dockerfile Instruction Keyword, CVE, Component] PASSED AutocompleteTest > Verify #category search options contains #options > Verify IMAGES search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify IMAGES search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify IMAGES search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] PASSED AutocompleteTest > Verify #category search options contains #options > Verify IMAGE_VULNERABILITIES_V2 search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify IMAGE_VULNERABILITIES_V2 search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify IMAGE_VULNERABILITIES_V2 search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] PASSED AutocompleteTest > Verify #category search options contains #options > Verify IMAGE_COMPONENTS_V2 search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify IMAGE_COMPONENTS_V2 search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify IMAGE_COMPONENTS_V2 search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] PASSED AutocompleteTest > Verify #category search options contains #options > Verify PODS search options contains [Namespace] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify PODS search options contains [Namespace] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify PODS search options contains [Namespace] PASSED AutocompleteTest > Verify #category search options contains #options > Verify POLICIES search options contains [Policy] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify POLICIES search options contains [Policy] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify POLICIES search options contains [Policy] PASSED AutocompleteTest > Verify #category search options contains #options > Verify SECRETS search options contains [Secret] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify SECRETS search options contains [Secret] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify SECRETS search options contains [Secret] PASSED AutocompleteTest > Verify #category search options contains #options > Verify PROCESS_INDICATORS search options contains [Process Name] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify PROCESS_INDICATORS search options contains [Process Name] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify PROCESS_INDICATORS search options contains [Process Name] PASSED AutocompleteTest > Verify #category search options contains #options > Verify CLUSTERS search options contains [Cluster] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify CLUSTERS search options contains [Cluster] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify CLUSTERS search options contains [Cluster] PASSED AutocompleteTest > Verify #category search options contains #options > Verify NAMESPACES search options contains [Cluster, Namespace] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify NAMESPACES search options contains [Cluster, Namespace] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify NAMESPACES search options contains [Cluster, Namespace] PASSED AutocompleteTest > Verify #category search options contains #options > Verify COMPLIANCE search options contains [Cluster, Control, Deployment, Namespace, Node, Standard] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify COMPLIANCE search options contains [Cluster, Control, Deployment, Namespace, Node, Standard] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify COMPLIANCE search options contains [Cluster, Control, Deployment, Namespace, Node, Standard] PASSED AutocompleteTest > Verify #category search options contains #options > Verify NODES search options contains [Cluster, Node] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify NODES search options contains [Cluster, Node] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify NODES search options contains [Cluster, Node] PASSED AutocompleteTest > Verify #category search options contains #options > Verify SERVICE_ACCOUNTS search options contains [Cluster, Service Account] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify SERVICE_ACCOUNTS search options contains [Cluster, Service Account] 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify SERVICE_ACCOUNTS search options contains [Cluster, Service Account] PASSED AutocompleteTest > Verify #category search options contains #options > Verify ROLES search options contains [Cluster, Role] STANDARD_OUT 04:42:59 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify ROLES search options contains [Cluster, Role] 04:43:00 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify ROLES search options contains [Cluster, Role] PASSED AutocompleteTest > Verify #category search options contains #options > Verify ROLEBINDINGS search options contains [Cluster, Role Binding, Subject] STANDARD_OUT 04:43:00 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify ROLEBINDINGS search options contains [Cluster, Role Binding, Subject] 04:43:00 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify ROLEBINDINGS search options contains [Cluster, Role Binding, Subject] PASSED AutocompleteTest > Verify #category search options contains #options > Verify SUBJECTS search options contains [Subject] STANDARD_OUT 04:43:00 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify SUBJECTS search options contains [Subject] 04:43:00 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify SUBJECTS search options contains [Subject] PASSED AutocompleteTest STANDARD_OUT 04:43:00 | INFO | AutocompleteTest | AutocompleteTest | Ending testsuite 04:43:00 | INFO | AutocompleteTest | AutocompleteTest | Checking if cluster is healthy after test 04:43:00 | DEBUG | AutocompleteTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries BuiltinPoliciesTest STANDARD_OUT 04:43:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testsuite 04:43:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: ADD Command used instead of COPY 04:43:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Container using read-write root filesystem 04:43:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Curl in Image 04:43:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Deployments should have at least one ingress Network Policy 04:43:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Deployments with externally exposed endpoints 04:43:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Docker CIS 4.4: Ensure images are scanned and rebuilt to include security patches 04:43:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Docker CIS 5.21: Ensure the default seccomp profile is not disabled 04:43:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Drop All Capabilities 04:43:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Fixable CVSS >= 6 and Privileged 04:43:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Fixable CVSS >= 7 04:43:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Images with no scans 04:43:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Login Binaries 04:43:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Password Binaries 04:43:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Process with UID 0 04:43:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Rapid Reset: Denial of Service Vulnerability in HTTP/2 Protocol 04:43:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Red Hat images must be signed by a Red Hat release key 04:43:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Required Annotation: Email 04:43:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Required Annotation: Owner/Team 04:43:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Required Image Label 04:43:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Required Label: Owner/Team 04:43:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Secret Mounted as Environment Variable 04:43:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: SetUID Processes 04:43:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Shadow File Modification 04:43:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Shell Management 04:43:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Wget in Image 04:43:02 | DEBUG | BuiltinPoliciesTest | Kubernetes | test-password: secret created. 04:43:02 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting trigger-docker-mount without waiting for deployment 04:43:02 | DEBUG | BuiltinPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace trigger-docker-mount 04:43:02 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting trigger-crio-mount without waiting for deployment 04:43:02 | DEBUG | BuiltinPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace trigger-crio-mount 04:43:02 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting trigger-unscanned without waiting for deployment 04:43:02 | DEBUG | BuiltinPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace trigger-unscanned 04:43:02 | DEBUG | BuiltinPoliciesTest | OpenShift | Namespace qa already exists 04:43:02 | DEBUG | BuiltinPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace trigger-most 04:43:02 | DEBUG | BuiltinPoliciesTest | OpenShift | Namespace qa already exists 04:43:02 | DEBUG | BuiltinPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace trigger-alpine 04:43:02 | DEBUG | BuiltinPoliciesTest | Kubernetes | Waiting for trigger-most to start 04:43:02 | DEBUG | BuiltinPoliciesTest | Kubernetes | Status of trigger-most's pods: 04:43:02 | DEBUG | BuiltinPoliciesTest | Kubernetes | - trigger-most-bbc48869c-956pl Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:43:02 | DEBUG | BuiltinPoliciesTest | Kubernetes | 0/1 are in the ready state for trigger-most 04:43:05 | DEBUG | BuiltinPoliciesTest | Kubernetes | Waiting for trigger-most to start 04:43:05 | DEBUG | BuiltinPoliciesTest | Kubernetes | Status of trigger-most's pods: 04:43:05 | DEBUG | BuiltinPoliciesTest | Kubernetes | - trigger-most-bbc48869c-956pl Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:43:05 | DEBUG | BuiltinPoliciesTest | Kubernetes | 0/1 are in the ready state for trigger-most 04:43:08 | DEBUG | BuiltinPoliciesTest | Kubernetes | Waiting for trigger-most to start 04:43:08 | DEBUG | BuiltinPoliciesTest | Kubernetes | Status of trigger-most's pods: 04:43:08 | DEBUG | BuiltinPoliciesTest | Kubernetes | - trigger-most-bbc48869c-956pl Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:43:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:43:08 | DEBUG | BuiltinPoliciesTest | Kubernetes | All 1 replicas found in ready state for trigger-most 04:43:08 | DEBUG | BuiltinPoliciesTest | Kubernetes | Took 6 seconds for k8s deployment trigger-most 04:43:08 | DEBUG | BuiltinPoliciesTest | Kubernetes | Updating deployment trigger-most with 1 pods 04:43:08 | DEBUG | BuiltinPoliciesTest | Kubernetes | Waiting for trigger-alpine to start 04:43:08 | DEBUG | BuiltinPoliciesTest | Kubernetes | Status of trigger-alpine's pods: 04:43:08 | DEBUG | BuiltinPoliciesTest | Kubernetes | - trigger-alpine-59c7b57868-v46wq Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:43:04Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:43:08 | DEBUG | BuiltinPoliciesTest | Kubernetes | All 1 replicas found in ready state for trigger-alpine 04:43:08 | DEBUG | BuiltinPoliciesTest | Kubernetes | Took 0 seconds for k8s deployment trigger-alpine 04:43:08 | DEBUG | BuiltinPoliciesTest | Kubernetes | Updating deployment trigger-alpine with 1 pods 04:43:08 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Waiting for trigger-most 04:43:08 | INFO | BuiltinPoliciesTest | Services | SR found deployment trigger-most within 0s 04:43:08 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Waiting for trigger-alpine 04:43:08 | INFO | BuiltinPoliciesTest | Services | SR found deployment trigger-alpine within 0s BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Alpine Linux Package Manager Execution' is triggered STANDARD_OUT 04:43:08 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Alpine Linux Package Manager Execution' is triggered 04:43:08 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:08 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:08 | INFO | BuiltinPoliciesTest | Services | Alpine Linux Package Manager Execution triggered after waiting 0 seconds 04:43:08 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Alpine Linux Package Manager Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'chkconfig Execution' is triggered STANDARD_OUT 04:43:08 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'chkconfig Execution' is triggered 04:43:08 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:11 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:14 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:14 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:14 | INFO | BuiltinPoliciesTest | Services | chkconfig Execution triggered after waiting 6 seconds 04:43:14 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'chkconfig Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Container using read-write root filesystem' is triggered STANDARD_OUT 04:43:14 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Container using read-write root filesystem' is triggered 04:43:14 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:14 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:14 | INFO | BuiltinPoliciesTest | Services | Container using read-write root filesystem triggered after waiting 0 seconds 04:43:14 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Container using read-write root filesystem' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Compiler Tool Execution' is triggered STANDARD_OUT 04:43:14 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Compiler Tool Execution' is triggered 04:43:15 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:15 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:15 | INFO | BuiltinPoliciesTest | Services | Compiler Tool Execution triggered after waiting 0 seconds 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Compiler Tool Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'crontab Execution' is triggered STANDARD_OUT 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'crontab Execution' is triggered 04:43:15 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:15 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:15 | INFO | BuiltinPoliciesTest | Services | crontab Execution triggered after waiting 0 seconds 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'crontab Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Cryptocurrency Mining Process Execution' is triggered STANDARD_OUT 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Cryptocurrency Mining Process Execution' is triggered 04:43:15 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:15 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:15 | INFO | BuiltinPoliciesTest | Services | Cryptocurrency Mining Process Execution triggered after waiting 0 seconds 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Cryptocurrency Mining Process Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Emergency Deployment Annotation' is triggered STANDARD_OUT 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Emergency Deployment Annotation' is triggered 04:43:15 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:15 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:15 | INFO | BuiltinPoliciesTest | Services | Emergency Deployment Annotation triggered after waiting 0 seconds 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Emergency Deployment Annotation' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Images with no scans' is triggered STANDARD_OUT 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Images with no scans' is triggered 04:43:15 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:15 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:15 | INFO | BuiltinPoliciesTest | Services | Images with no scans triggered after waiting 0 seconds 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Images with no scans' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'iptables Execution' is triggered STANDARD_OUT 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'iptables Execution' is triggered 04:43:15 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:15 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:15 | INFO | BuiltinPoliciesTest | Services | iptables Execution triggered after waiting 0 seconds 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'iptables Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Iptables or nftables Executed in Privileged Container' is triggered STANDARD_OUT 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Iptables or nftables Executed in Privileged Container' is triggered 04:43:15 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:15 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:15 | INFO | BuiltinPoliciesTest | Services | Iptables or nftables Executed in Privileged Container triggered after waiting 0 seconds 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Iptables or nftables Executed in Privileged Container' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Linux Group Add Execution' is triggered STANDARD_OUT 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Linux Group Add Execution' is triggered 04:43:15 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:15 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:15 | INFO | BuiltinPoliciesTest | Services | Linux Group Add Execution triggered after waiting 0 seconds 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Linux Group Add Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Linux User Add Execution' is triggered STANDARD_OUT 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Linux User Add Execution' is triggered 04:43:15 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:15 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:15 | INFO | BuiltinPoliciesTest | Services | Linux User Add Execution triggered after waiting 0 seconds 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Linux User Add Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Login Binaries' is triggered STANDARD_OUT 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Login Binaries' is triggered 04:43:15 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:15 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:15 | INFO | BuiltinPoliciesTest | Services | Login Binaries triggered after waiting 0 seconds 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Login Binaries' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Mount Container Runtime Socket' is triggered STANDARD_OUT 04:43:15 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Mount Container Runtime Socket' is triggered 04:43:16 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:16 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:16 | INFO | BuiltinPoliciesTest | Services | Mount Container Runtime Socket triggered after waiting 0 seconds 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Mount Container Runtime Socket' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Mount Container Runtime Socket' is triggered STANDARD_OUT 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Mount Container Runtime Socket' is triggered 04:43:16 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:16 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:16 | INFO | BuiltinPoliciesTest | Services | Mount Container Runtime Socket triggered after waiting 0 seconds 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Mount Container Runtime Socket' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Mounting Sensitive Host Directories' is triggered STANDARD_OUT 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Mounting Sensitive Host Directories' is triggered 04:43:16 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:16 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:16 | INFO | BuiltinPoliciesTest | Services | Mounting Sensitive Host Directories triggered after waiting 0 seconds 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Mounting Sensitive Host Directories' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Netcat Execution Detected' is triggered STANDARD_OUT 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Netcat Execution Detected' is triggered 04:43:16 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:16 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:16 | INFO | BuiltinPoliciesTest | Services | Netcat Execution Detected triggered after waiting 0 seconds 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Netcat Execution Detected' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Network Management Execution' is triggered STANDARD_OUT 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Network Management Execution' is triggered 04:43:16 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:16 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:16 | INFO | BuiltinPoliciesTest | Services | Network Management Execution triggered after waiting 0 seconds 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Network Management Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'nmap Execution' is triggered STANDARD_OUT 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'nmap Execution' is triggered 04:43:16 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:16 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:16 | INFO | BuiltinPoliciesTest | Services | nmap Execution triggered after waiting 0 seconds 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'nmap Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'No CPU request or memory limit specified' is triggered STANDARD_OUT 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'No CPU request or memory limit specified' is triggered 04:43:16 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:16 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:16 | INFO | BuiltinPoliciesTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'No CPU request or memory limit specified' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Password Binaries' is triggered STANDARD_OUT 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Password Binaries' is triggered 04:43:16 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:16 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:16 | INFO | BuiltinPoliciesTest | Services | Password Binaries triggered after waiting 0 seconds 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Password Binaries' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process Targeting Cluster Kubelet Endpoint' is triggered STANDARD_OUT 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Process Targeting Cluster Kubelet Endpoint' is triggered 04:43:16 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:16 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:16 | INFO | BuiltinPoliciesTest | Services | Process Targeting Cluster Kubelet Endpoint triggered after waiting 0 seconds 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process Targeting Cluster Kubelet Endpoint' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process Targeting Cluster Kubernetes Docker Stats Endpoint' is triggered STANDARD_OUT 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Process Targeting Cluster Kubernetes Docker Stats Endpoint' is triggered 04:43:16 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:16 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:16 | INFO | BuiltinPoliciesTest | Services | Process Targeting Cluster Kubernetes Docker Stats Endpoint triggered after waiting 0 seconds 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process Targeting Cluster Kubernetes Docker Stats Endpoint' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process Targeting Kubernetes Service Endpoint' is triggered STANDARD_OUT 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Process Targeting Kubernetes Service Endpoint' is triggered 04:43:16 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:16 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:16 | INFO | BuiltinPoliciesTest | Services | Process Targeting Kubernetes Service Endpoint triggered after waiting 0 seconds 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process Targeting Kubernetes Service Endpoint' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process with UID 0' is triggered STANDARD_OUT 04:43:16 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Process with UID 0' is triggered 04:43:17 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:17 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:17 | INFO | BuiltinPoliciesTest | Services | Process with UID 0 triggered after waiting 0 seconds 04:43:17 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process with UID 0' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Red Hat Package Manager Execution' is triggered STANDARD_OUT 04:43:17 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Red Hat Package Manager Execution' is triggered 04:43:17 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:20 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:20 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:20 | INFO | BuiltinPoliciesTest | Services | Red Hat Package Manager Execution triggered after waiting 3 seconds 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Red Hat Package Manager Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Remote File Copy Binary Execution' is triggered STANDARD_OUT 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Remote File Copy Binary Execution' is triggered 04:43:20 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:20 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:20 | INFO | BuiltinPoliciesTest | Services | Remote File Copy Binary Execution triggered after waiting 0 seconds 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Remote File Copy Binary Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Required Annotation: Email' is triggered STANDARD_OUT 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Required Annotation: Email' is triggered 04:43:20 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:20 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:20 | INFO | BuiltinPoliciesTest | Services | Required Annotation: Email triggered after waiting 0 seconds 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Required Annotation: Email' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Required Annotation: Owner/Team' is triggered STANDARD_OUT 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Required Annotation: Owner/Team' is triggered 04:43:20 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:20 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:20 | INFO | BuiltinPoliciesTest | Services | Required Annotation: Owner/Team triggered after waiting 0 seconds 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Required Annotation: Owner/Team' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Required Label: Owner/Team' is triggered STANDARD_OUT 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Required Label: Owner/Team' is triggered 04:43:20 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:20 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:20 | INFO | BuiltinPoliciesTest | Services | Required Label: Owner/Team triggered after waiting 0 seconds 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Required Label: Owner/Team' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Secret Mounted as Environment Variable' is triggered STANDARD_OUT 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Secret Mounted as Environment Variable' is triggered 04:43:20 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:20 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:20 | INFO | BuiltinPoliciesTest | Services | Secret Mounted as Environment Variable triggered after waiting 0 seconds 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Secret Mounted as Environment Variable' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Secure Shell Server (sshd) Execution' is triggered STANDARD_OUT 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Secure Shell Server (sshd) Execution' is triggered 04:43:20 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:20 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:20 | INFO | BuiltinPoliciesTest | Services | Secure Shell Server (sshd) Execution triggered after waiting 0 seconds 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Secure Shell Server (sshd) Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'SetUID Processes' is triggered STANDARD_OUT 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'SetUID Processes' is triggered 04:43:20 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:20 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:20 | INFO | BuiltinPoliciesTest | Services | SetUID Processes triggered after waiting 0 seconds 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'SetUID Processes' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Shadow File Modification' is triggered STANDARD_OUT 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Shadow File Modification' is triggered 04:43:20 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:20 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:20 | INFO | BuiltinPoliciesTest | Services | Shadow File Modification triggered after waiting 0 seconds 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Shadow File Modification' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Shell Spawned by Java Application' is triggered STANDARD_OUT 04:43:20 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Shell Spawned by Java Application' is triggered 04:43:20 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:21 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:21 | INFO | BuiltinPoliciesTest | Services | Shell Spawned by Java Application triggered after waiting 0 seconds 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Shell Spawned by Java Application' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'systemctl Execution' is triggered STANDARD_OUT 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'systemctl Execution' is triggered 04:43:21 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:21 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:21 | INFO | BuiltinPoliciesTest | Services | systemctl Execution triggered after waiting 0 seconds 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'systemctl Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'systemd Execution' is triggered STANDARD_OUT 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'systemd Execution' is triggered 04:43:21 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:21 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:21 | INFO | BuiltinPoliciesTest | Services | systemd Execution triggered after waiting 0 seconds 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'systemd Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Ubuntu Package Manager Execution' is triggered STANDARD_OUT 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Ubuntu Package Manager Execution' is triggered 04:43:21 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:21 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:43:21 | INFO | BuiltinPoliciesTest | Services | Ubuntu Package Manager Execution triggered after waiting 0 seconds 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Ubuntu Package Manager Execution' is triggered PASSED BuiltinPoliciesTest STANDARD_OUT 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:21 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:22 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:43:23 | DEBUG | BuiltinPoliciesTest | Kubernetes | Removed the deployment: trigger-most 04:43:23 | DEBUG | BuiltinPoliciesTest | Kubernetes | Removed the deployment: trigger-alpine 04:43:23 | DEBUG | BuiltinPoliciesTest | Kubernetes | Removed the deployment: trigger-docker-mount 04:43:23 | DEBUG | BuiltinPoliciesTest | Kubernetes | Removed the deployment: trigger-crio-mount 04:43:23 | DEBUG | BuiltinPoliciesTest | Kubernetes | Removed the deployment: trigger-unscanned 04:43:28 | DEBUG | BuiltinPoliciesTest | Kubernetes | test-password: Secret removed. 04:43:28 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testsuite 04:43:28 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Checking if cluster is healthy after test 04:43:28 | DEBUG | BuiltinPoliciesTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries CSVTest STANDARD_OUT 04:43:28 | INFO | CSVTest | CSVTest | Starting testsuite 04:43:34 | DEBUG | CSVTest | OpenShift | Namespace qa already exists 04:43:34 | DEBUG | CSVTest | Kubernetes | Told the orchestrator to createOrReplace nginx-deployment 04:43:34 | DEBUG | CSVTest | Kubernetes | Waiting for nginx-deployment to start 04:43:34 | DEBUG | CSVTest | Kubernetes | Status of nginx-deployment's pods: 04:43:34 | DEBUG | CSVTest | Kubernetes | - nginx-deployment-7f7dfc5fcd-txkfw Container status: [] 04:43:34 | DEBUG | CSVTest | Kubernetes | 0/1 are in the ready state for nginx-deployment 04:43:37 | DEBUG | CSVTest | Kubernetes | Waiting for nginx-deployment to start 04:43:37 | DEBUG | CSVTest | Kubernetes | Status of nginx-deployment's pods: 04:43:37 | DEBUG | CSVTest | Kubernetes | - nginx-deployment-7f7dfc5fcd-txkfw Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:43:35Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:43:37 | DEBUG | CSVTest | Kubernetes | All 1 replicas found in ready state for nginx-deployment 04:43:37 | DEBUG | CSVTest | Kubernetes | Took 3 seconds for k8s deployment nginx-deployment 04:43:37 | DEBUG | CSVTest | Kubernetes | Updating deployment nginx-deployment with 1 pods 04:43:37 | INFO | CSVTest | Services | SR found deployment nginx-deployment within 0s 04:43:43 | INFO | CSVTest | Services | SR found vulnerabilities for the image quay.io/rhacs-eng/qa-multi-arch:nginx-1.12@sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728 within 6s CSVTest > Verify CVE CSV data scoped by entity is correct #description > Verify CVE CSV data scoped by entity is correct FIXABLE_CVES_IN_IMAGE_QUERY STANDARD_OUT 04:43:43 | INFO | CSVTest | CSVTest | Starting testcase: Verify CVE CSV data scoped by entity is correct FIXABLE_CVES_IN_IMAGE_QUERY 04:43:43 | DEBUG | CSVTest | GraphQLService | GraphQL query: {"query":"\n query getFixableCvesInImage($id: ID!, $query: String, $scopeQuery: String, $vulnQuery: String,\n $vulnPagination: Pagination) {\n result: image(id: $id) {\n id\n vulnerabilities: imageVulnerabilities(query: $vulnQuery, pagination: $vulnPagination) {\n ...cveFields\n __typename\n }\n __typename\n }\n }\n \n fragment cveFields on ImageVulnerability {\n id: cve\n cvss\n isFixable(query: $scopeQuery)\n deploymentCount(query: $query)\n imageCount(query: $query)\n componentCount: imageComponentCount(query: $query)\n __typename\n }\n \n ","variables":{"id":"sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728","query":"","scopeQuery":"","vulnQuery":"Fixable:true","vulnPagination":{"limit":0,"offset":0,"sortOption":{"field":"cvss","reversed":true}}}} 04:43:43 | DEBUG | CSVTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":{"id":"sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728","vulnerabilities":[{"id":"CVE-2018-14599","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2018-25014","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2019-6978","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2022-25315","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2022-25236","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2019-11068","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"Image... 04:43:44 | INFO | CSVTest | CSVTest | Number of CVEs received from CSV endpoint: 152 04:43:44 | INFO | CSVTest | CSVTest | Ending testcase CSVTest > Verify CVE CSV data scoped by entity is correct #description > Verify CVE CSV data scoped by entity is correct FIXABLE_CVES_IN_IMAGE_QUERY PASSED CSVTest > Verify CVE CSV data scoped by entity is correct #description > Verify CVE CSV data scoped by entity is correct FIXABLE_CVES_IN_DEPLOYMENT_QUERY STANDARD_OUT 04:43:44 | INFO | CSVTest | CSVTest | Starting testcase: Verify CVE CSV data scoped by entity is correct FIXABLE_CVES_IN_DEPLOYMENT_QUERY 04:43:44 | DEBUG | CSVTest | GraphQLService | GraphQL query: {"query":"\n query getFixableCvesInDeployment($id: ID!, $query: String, $scopeQuery: String, $vulnQuery: String,\n $vulnPagination: Pagination) {\n result: deployment(id: $id) {\n id\n vulnerabilities: imageVulnerabilities(query: $vulnQuery, pagination: $vulnPagination) {\n ...cveFields\n __typename\n }\n __typename\n }\n }\n \n fragment cveFields on ImageVulnerability {\n id: cve\n cvss\n isFixable(query: $scopeQuery)\n deploymentCount(query: $query)\n imageCount(query: $query)\n componentCount: imageComponentCount(query: $query)\n __typename\n }\n \n ","variables":{"id":"a7cf2800-5696-46c1-88be-6ec9ca1cc197","query":"","scopeQuery":"","vulnQuery":"Fixable:true","vulnPagination":{"limit":0,"offset":0,"sortOption":{"field":"cvss","reversed":true}}}} 04:43:44 | DEBUG | CSVTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":{"id":"a7cf2800-5696-46c1-88be-6ec9ca1cc197","vulnerabilities":[{"id":"CVE-2018-14599","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2018-25014","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2019-6978","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2022-25315","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2022-25236","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2019-11068","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2017-124... 04:43:45 | INFO | CSVTest | CSVTest | Number of CVEs received from CSV endpoint: 152 04:43:45 | INFO | CSVTest | CSVTest | Ending testcase CSVTest > Verify CVE CSV data scoped by entity is correct #description > Verify CVE CSV data scoped by entity is correct FIXABLE_CVES_IN_DEPLOYMENT_QUERY PASSED CSVTest STANDARD_OUT 04:43:45 | DEBUG | CSVTest | Kubernetes | Removed the deployment: nginx-deployment 04:43:45 | INFO | CSVTest | CSVTest | Ending testsuite 04:43:45 | INFO | CSVTest | CSVTest | Checking if cluster is healthy after test 04:43:45 | DEBUG | CSVTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries CertExpiryTest STANDARD_OUT 04:43:45 | INFO | CertExpiryTest | CertExpiryTest | Starting testsuite CertExpiryTest > Test Central cert expiry STANDARD_OUT 04:43:45 | INFO | CertExpiryTest | CertExpiryTest | Starting testcase: Test Central cert expiry 04:43:45 | INFO | CertExpiryTest | CertExpiryTest | Ending testcase CertExpiryTest > Test Central cert expiry PASSED CertExpiryTest > Test Scanner cert expiry STANDARD_OUT 04:43:45 | INFO | CertExpiryTest | CertExpiryTest | Starting testcase: Test Scanner cert expiry 04:43:45 | DEBUG | CertExpiryTest | Helpers | Ran: ./scripts/ci/is-scanner-v2-available.sh stackrox Exit: 0 Stdout: INFO: Fri Oct 31 04:43:45 UTC 2025: Waiting for Scanner V2 deployment to appear in namespace stackrox... INFO: Fri Oct 31 04:43:45 UTC 2025: ** Scanner V2 is deployed in namespace stackrox pod/scanner-7487f9cbb8-mchmc condition met Stderr: 04:43:46 | INFO | CertExpiryTest | CertExpiryTest | Ending testcase CertExpiryTest > Test Scanner cert expiry PASSED CertExpiryTest STANDARD_OUT 04:43:46 | INFO | CertExpiryTest | CertExpiryTest | Ending testsuite 04:43:46 | INFO | CertExpiryTest | CertExpiryTest | Checking if cluster is healthy after test 04:43:46 | DEBUG | CertExpiryTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries CertRotationTest STANDARD_OUT 04:43:46 | INFO | CertRotationTest | CertRotationTest | Starting testsuite CertRotationTest > Test Central cert rotation STANDARD_OUT 04:43:46 | INFO | CertRotationTest | CertRotationTest | Starting testcase: Test Central cert rotation 04:43:46 | INFO | CertRotationTest | CertRotationTest | Ending testcase CertRotationTest > Test Central cert rotation PASSED CertRotationTest > Test Scanner cert rotation STANDARD_OUT 04:43:46 | INFO | CertRotationTest | CertRotationTest | Starting testcase: Test Scanner cert rotation 04:43:46 | INFO | CertRotationTest | CertRotationTest | Ending testcase CertRotationTest > Test Scanner cert rotation PASSED CertRotationTest > Test sensor cert rotation STANDARD_OUT 04:43:46 | INFO | CertRotationTest | CertRotationTest | Starting testcase: Test sensor cert rotation 04:43:46 | INFO | CertRotationTest | CertRotationTest | Admission control secret present: true 04:43:46 | INFO | CertRotationTest | CertRotationTest | Ending testcase CertRotationTest > Test sensor cert rotation PASSED CertRotationTest > Test sensor cert rotation with upgrader succeeds for manifest based installed clusters STANDARD_OUT 04:43:46 | INFO | CertRotationTest | CertRotationTest | Starting testcase: Test sensor cert rotation with upgrader succeeds for manifest based installed clusters 04:43:46 | DEBUG | CertRotationTest | Helpers | Caught exception. Retrying in 3s (attempt 0 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.Secret.getMetadata()" because " 04:43:49 | DEBUG | CertRotationTest | Helpers | Caught exception. Retrying in 3s (attempt 1 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.Secret.getMetadata()" because " 04:43:52 | INFO | CertRotationTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:43:52 | INFO | CertRotationTest | CertRotationTest | Ending testcase CertRotationTest > Test sensor cert rotation with upgrader succeeds for manifest based installed clusters SKIPPED CertRotationTest > Test sensor cert rotation with upgrader fails for Helm clusters STANDARD_OUT 04:43:52 | INFO | CertRotationTest | CertRotationTest | Starting testcase: Test sensor cert rotation with upgrader fails for Helm clusters 04:43:52 | INFO | CertRotationTest | CertRotationTest | Ending testcase CertRotationTest > Test sensor cert rotation with upgrader fails for Helm clusters PASSED CertRotationTest STANDARD_OUT 04:43:52 | INFO | CertRotationTest | CertRotationTest | Ending testsuite 04:43:52 | INFO | CertRotationTest | CertRotationTest | Checking if cluster is healthy after test 04:43:52 | DEBUG | CertRotationTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ClientCertAuthTest STANDARD_OUT 04:43:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testsuite 04:43:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Client cert auth provider ID is 2ec827b7-408a-48e0-aa5b-ae300262aff2 04:43:52 | DEBUG | ClientCertAuthTest | Helpers | Calling services.GroupService.createGroup with 3 retries 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Certificate token is eyJhbGciOiJSUzI1NiIsImtpZCI6Imp3dGswIiwidHlwIjoiSldUIn0.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.CtfmxPwF7XMH_FS2h1iZQDDrCf-cOa7Ku7pZutRDSDkzWD1_4POmIL5pQKTpEsHRnKu-Kmnq8gpEWrHBaOOBLjvptAI6wc7jcLzFepvNC0dgQUmzh2BGE3sJIXlCILykFTXiJAgvx0JmPYA5P5uuLtG1jjXn5WxTRfHM3UXvtZh7mgL2SsyARF0tyNj8hCFNJV4-3Rtzt4uZMvm-3H76sNzabh9EXYZfK_tEN8Zk24NNUQq8Nfk-V88Y8NS83STEgwSK_zBQwwsTLgwXwd23OGXmT1T5ein4vjR2pBAMASOPnceXZlQ8nFTAR0DENOe_uw4JpLGwJbjsEBrlTZRSE7FEUFre6J3q46hQwaNLFp2WrfPyxcwgyqrT-LUAKMyTcM8TyasB3A6yHVdwURXpT6WtbVu0CiLk02-E7B3d42EL70088-JmychAlck_tRhFWxX5WPr8Rcpt9cPohozRSBXeZC8ZjNpOwDlEqACtFsEqQw8kvoX2ByTeLE1IdiX64mRGZwRFPYFUOnEcFjcMlLWTLjsJmMOejDxnwd4ljv1OeNb47l1YhZPwCEiQyBgse94fJq74OVUP8_bFiQuHjp50FJoIvX2aLjGLPpFjdKjtrHQ22INnBFPLExI8ntZ6gP2G_Cdk8IFtAFBQHQmJQP7jNJF0Au8SYdfFoldXHas #notsecret 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Client cert auth provider ID is 62a24b63-bbee-4106-91dc-bb333d0a3901 04:43:53 | DEBUG | ClientCertAuthTest | Helpers | Calling services.GroupService.createGroup with 3 retries 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Certificate token is eyJhbGciOiJSUzI1NiIsImtpZCI6Imp3dGswIiwidHlwIjoiSldUIn0.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.sgd6EEwUh1uViCDwN3OAZUZBldwKKqw4LD2s3Q9-Bk0BnJfmIVrj-TIcFaT-SJ-rtU93YbHyLNydglG7NjAEnd1c4mjDBBevUSOjcw9ckhQlPm-sp2SSYn7jAS9rA5s9VQUslGG-gRuZJ_PWlSS1kHIJyWCu2UW7ufOKSt_mu3_Ng6OoVMwijeRGzH4_RAPWCSx55D6bn2K3P-2F3097ifmluc1xwJ7WEEd9AfmjqSU_1DYoY6miNcRcatHVm41BLcmpf6fTqlWPNAS946dKbRMJZWsnzGiJqF1_EYPlFiXhBD8caYNaGK5HfmzXIGVDDSN1pDM2_QpzpwFSj9INmrwQZjQp2rDdiuNtpXyJnBlDnFQhWzu0ekhjY9hIcIzcl4bLW0lp2oONAupvXMWtJVyDbZeBbkee-mKpbxC6pAizXpTM23gCAXEWibJNSa2aGfACHRz5RvyLDYdR-RblJl4L3U5pjikOhaRfgkixrjyNO9UrAR-Jnkb28owL_KVOWDtTK40Q7JhnJc1cmwO7-GTUAGEwuRNXCBABlrluK_AYG7gkd0eR1Eu-e3lYGi7qSZMQOM4xPtOdXJy54BqVoJV1VM5jNbBFdXM2p1ISqsQNxPasMKlHMlHLHQuExAhGME-ela4OkIcvo0dJgvYH9Jl6MLttE-hS2GA3sZcUL9M #notsecret ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header none STANDARD_OUT 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: false and auth header none 04:43:53 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_0(ClientCertAuthTest.groovy:105) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:43:53 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderID(ClientCertAuthTest.groovy:69) [1 skipped] at ClientCertAuthTest.$spock_feature_1_0(ClientCertAuthTest.groovy:109) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header none PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header basic STANDARD_OUT 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: false and auth header basic 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header basic PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header basic STANDARD_OUT 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: true and auth header basic 04:43:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header basic PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header none STANDARD_OUT 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: true and auth header none 04:43:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:43:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header none PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header certtoken0 STANDARD_OUT 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: true and auth header certtoken0 04:43:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:43:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header certtoken0 PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header certtoken1 STANDARD_OUT 04:43:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: true and auth header certtoken1 04:43:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header certtoken1 PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header certtoken0 STANDARD_OUT 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: false and auth header certtoken0 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:43:54 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_0(ClientCertAuthTest.groovy:105) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:43:54 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderID(ClientCertAuthTest.groovy:69) [1 skipped] at ClientCertAuthTest.$spock_feature_1_0(ClientCertAuthTest.groovy:109) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header certtoken0 PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header certtoken1 STANDARD_OUT 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: false and auth header certtoken1 04:43:54 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_0(ClientCertAuthTest.groovy:105) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:43:54 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderID(ClientCertAuthTest.groovy:69) [1 skipped] at ClientCertAuthTest.$spock_feature_1_0(ClientCertAuthTest.groovy:109) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header certtoken1 PASSED ClientCertAuthTest > Delete Auth provider STANDARD_OUT 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Delete Auth provider 04:43:54 | DEBUG | ClientCertAuthTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:43:54 | DEBUG | ClientCertAuthTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Delete Auth provider PASSED ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: true and auth header none after deletion STANDARD_OUT 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication fails with client cert: true and auth header none after deletion 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:43:54 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_2(ClientCertAuthTest.groovy:169) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: true and auth header none after deletion PASSED ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: true and auth header certtoken0 after deletion STANDARD_OUT 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication fails with client cert: true and auth header certtoken0 after deletion 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:43:54 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_2(ClientCertAuthTest.groovy:169) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: true and auth header certtoken0 after deletion PASSED ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: true and auth header certtoken1 after deletion STANDARD_OUT 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication fails with client cert: true and auth header certtoken1 after deletion 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:43:54 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_2(ClientCertAuthTest.groovy:169) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: true and auth header certtoken1 after deletion PASSED ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: false and auth header certtoken0 after deletion STANDARD_OUT 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication fails with client cert: false and auth header certtoken0 after deletion 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:43:54 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:43:54 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_2(ClientCertAuthTest.groovy:169) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: false and auth header certtoken0 after deletion PASSED ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: false and auth header certtoken1 after deletion STANDARD_OUT 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication fails with client cert: false and auth header certtoken1 after deletion 04:43:54 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_2(ClientCertAuthTest.groovy:169) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: false and auth header certtoken1 after deletion PASSED ClientCertAuthTest STANDARD_OUT 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testsuite 04:43:54 | INFO | ClientCertAuthTest | ClientCertAuthTest | Checking if cluster is healthy after test 04:43:54 | DEBUG | ClientCertAuthTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries CloudSourcesTest STANDARD_OUT 04:43:54 | INFO | CloudSourcesTest | CloudSourcesTest | Starting testsuite CloudSourcesTest > Create OCM cloud source and verify discovered clusters exist: #authMethod > Create OCM cloud source and verify discovered clusters exist: OCM offline token STANDARD_OUT 04:43:54 | INFO | CloudSourcesTest | CloudSourcesTest | Starting testcase: Create OCM cloud source and verify discovered clusters exist: OCM offline token 04:43:55 | DEBUG | CloudSourcesTest | Helpers | Caught exception. Retrying in 30s (attempt 0 of 10): Condition not satisfied: count > 0 | | 0 false 04:44:26 | INFO | CloudSourcesTest | CloudSourcesService | Cloud source deleted: 714f9cc4-43b0-414f-b579-4098eddf83e3 04:44:26 | INFO | CloudSourcesTest | CloudSourcesTest | Ending testcase CloudSourcesTest > Create OCM cloud source and verify discovered clusters exist: #authMethod > Create OCM cloud source and verify discovered clusters exist: OCM offline token PASSED CloudSourcesTest > Create OCM cloud source and verify discovered clusters exist: #authMethod > Create OCM cloud source and verify discovered clusters exist: OCM service account STANDARD_OUT 04:44:26 | INFO | CloudSourcesTest | CloudSourcesTest | Starting testcase: Create OCM cloud source and verify discovered clusters exist: OCM service account 04:44:26 | DEBUG | CloudSourcesTest | Helpers | Caught exception. Retrying in 30s (attempt 0 of 10): Condition not satisfied: count > 0 | | 0 false 04:44:56 | INFO | CloudSourcesTest | CloudSourcesService | Cloud source deleted: a47116fa-a041-4423-9eb1-fe9b477c5af2 04:44:56 | INFO | CloudSourcesTest | CloudSourcesTest | Ending testcase CloudSourcesTest > Create OCM cloud source and verify discovered clusters exist: #authMethod > Create OCM cloud source and verify discovered clusters exist: OCM service account PASSED CloudSourcesTest STANDARD_OUT 04:44:56 | INFO | CloudSourcesTest | CloudSourcesTest | Ending testsuite 04:44:56 | INFO | CloudSourcesTest | CloudSourcesTest | Checking if cluster is healthy after test 04:44:56 | DEBUG | CloudSourcesTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ClusterInitBundleTest STANDARD_OUT 04:44:56 | INFO | ClusterInitBundleTest | ClusterInitBundleTest | Starting testsuite ClusterInitBundleTest > Test that cluster init bundle can be revoked when it has no impacted clusters STANDARD_OUT 04:44:57 | INFO | ClusterInitBundleTest | ClusterInitBundleTest | Starting testcase: Test that cluster init bundle can be revoked when it has no impacted clusters 04:44:57 | INFO | ClusterInitBundleTest | ClusterInitBundleTest | Ending testcase ClusterInitBundleTest > Test that cluster init bundle can be revoked when it has no impacted clusters PASSED ClusterInitBundleTest STANDARD_OUT 04:44:57 | INFO | ClusterInitBundleTest | ClusterInitBundleTest | Ending testsuite 04:44:57 | INFO | ClusterInitBundleTest | ClusterInitBundleTest | Checking if cluster is healthy after test 04:44:57 | DEBUG | ClusterInitBundleTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ClustersTest STANDARD_OUT 04:44:57 | INFO | ClustersTest | ClustersTest | Starting testsuite ClustersTest > Test cluster status has cert expiry STANDARD_OUT 04:44:57 | INFO | ClustersTest | ClustersTest | Starting testcase: Test cluster status has cert expiry 04:44:57 | INFO | ClustersTest | ClustersTest | Ending testcase ClustersTest > Test cluster status has cert expiry PASSED ClustersTest > Test cluster health status is healthy STANDARD_OUT 04:44:57 | INFO | ClustersTest | ClustersTest | Starting testcase: Test cluster health status is healthy 04:44:57 | INFO | ClustersTest | ClustersTest | Ending testcase ClustersTest > Test cluster health status is healthy PASSED ClustersTest STANDARD_OUT 04:44:57 | INFO | ClustersTest | ClustersTest | Ending testsuite 04:44:57 | INFO | ClustersTest | ClustersTest | Checking if cluster is healthy after test 04:44:57 | DEBUG | ClustersTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ComplianceTest STANDARD_OUT 04:44:57 | INFO | ComplianceTest | ComplianceTest | Starting testsuite 04:44:57 | DEBUG | ComplianceTest | ImageIntegrationService | Integration tested: gcr 04:44:58 | DEBUG | ComplianceTest | ImageIntegrationService | Integration created: gcr: 7a8339c6-b931-4f9a-b617-54dca497b7c6 04:44:58 | DEBUG | ComplianceTest | ImageIntegrationService | Integration found after creation: gcr: 7a8339c6-b931-4f9a-b617-54dca497b7c6 04:45:28 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:45:28 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered all compliance runs 04:45:28 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the runs to finish... 04:45:36 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance runs took 8.149s ComplianceTest > Verify static compliance checks STANDARD_OUT 04:45:36 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify static compliance checks 04:45:36 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify static compliance checks PASSED ComplianceTest > Verify compliance aggregation results STANDARD_OUT 04:45:36 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify compliance aggregation results 04:45:36 | INFO | ComplianceTest | ComplianceTest | Verifying aggregate counts for CIS_Kubernetes_v1_5 04:45:36 | INFO | ComplianceTest | ComplianceTest | Verifying aggregate counts for HIPAA_164 04:45:36 | INFO | ComplianceTest | ComplianceTest | Verifying aggregate counts for NIST_800_190 04:45:36 | INFO | ComplianceTest | ComplianceTest | Verifying aggregate counts for NIST_SP_800_53_Rev_4 04:45:36 | INFO | ComplianceTest | ComplianceTest | Verifying aggregate counts for PCI_DSS_3_2 04:45:36 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify compliance aggregation results PASSED ComplianceTest > Verify compliance checks contain no ERROR states STANDARD_OUT 04:45:36 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify compliance checks contain no ERROR states 04:45:36 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify compliance checks contain no ERROR states PASSED ComplianceTest > Verify all compliance checks contain evidence STANDARD_OUT 04:45:36 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify all compliance checks contain evidence 04:45:36 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify all compliance checks contain evidence PASSED ComplianceTest > Verify overall state of each check is correct based on each piece of evidence STANDARD_OUT 04:45:36 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify overall state of each check is correct based on each piece of evidence 04:45:36 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify overall state of each check is correct based on each piece of evidence PASSED ComplianceTest > Verify all kube-system namespace checks are SKIPPED STANDARD_OUT 04:45:36 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify all kube-system namespace checks are SKIPPED 04:45:37 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify all kube-system namespace checks are SKIPPED PASSED ComplianceTest > Verify compliance csv export STANDARD_OUT 04:45:37 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify compliance csv export 04:45:38 | INFO | ComplianceTest | ComplianceTest | Verified 4718 out of 4718 total rows 04:45:38 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify compliance csv export PASSED ComplianceTest > Verify a subset of the checks in nodes were run in each node STANDARD_OUT 04:45:38 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify a subset of the checks in nodes were run in each node 04:45:38 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify a subset of the checks in nodes were run in each node PASSED ComplianceTest > Verify per-node cluster checks generate correct results when there is a master node STANDARD_OUT 04:45:38 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify per-node cluster checks generate correct results when there is a master node 04:45:38 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify per-node cluster checks generate correct results when there is a master node PASSED ComplianceTest > Verify Compliance aggregations with caching STANDARD_OUT 04:45:38 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify Compliance aggregations with caching 04:45:38 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify Compliance aggregations with caching PASSED ComplianceTest > Verify checks based on Integrations STANDARD_OUT 04:45:38 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify checks based on Integrations 04:45:38 | DEBUG | ComplianceTest | ImageIntegrationService | Image integration deleted: 7a8339c6-b931-4f9a-b617-54dca497b7c6 04:45:38 | DEBUG | ComplianceTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 04:45:39 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:45:39 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered PCI_DSS_3_2 compliance run 04:45:39 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:45:46 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 7.121s 04:45:46 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:45:46 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered NIST_800_190 compliance run 04:45:46 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:45:53 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 7.119s 04:45:53 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:45:53 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered HIPAA_164 compliance run 04:45:53 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:46:01 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 8.148s 04:46:01 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:46:01 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered NIST_SP_800_53_Rev_4 compliance run 04:46:01 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:46:08 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 7.122s 04:46:08 | INFO | ComplianceTest | ComplianceTest | Validating PCI_DSS_3_2:6_1 04:46:08 | INFO | ComplianceTest | ComplianceTest | Validating PCI_DSS_3_2:6_5_6 04:46:08 | INFO | ComplianceTest | ComplianceTest | Validating PCI_DSS_3_2:11_2_1 04:46:08 | INFO | ComplianceTest | ComplianceTest | Validating NIST_800_190:4_1_1 04:46:08 | INFO | ComplianceTest | ComplianceTest | Validating NIST_800_190:4_1_2 04:46:08 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:306_e 04:46:08 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:308_a_1_ii_b 04:46:08 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:308_a_7_ii_e 04:46:08 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:310_a_1 04:46:08 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:314_a_2_i_c 04:46:08 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:314_a_2_i_c 04:46:08 | INFO | ComplianceTest | ComplianceTest | Validating NIST_SP_800_53_Rev_4:IR_6_(1) 04:46:09 | DEBUG | ComplianceTest | ImageIntegrationService | Integration tested: gcr 04:46:09 | DEBUG | ComplianceTest | ImageIntegrationService | Integration created: gcr: f25ebe42-fc96-4d10-aa96-eb18178f20c8 04:46:09 | DEBUG | ComplianceTest | ImageIntegrationService | Integration found after creation: gcr: f25ebe42-fc96-4d10-aa96-eb18178f20c8 04:46:09 | DEBUG | ComplianceTest | ImageIntegrationService | Integration tested: Stackrox Scanner 04:46:09 | DEBUG | ComplianceTest | ImageIntegrationService | Integration created: Stackrox Scanner: 72557161-046c-4eb5-b3c6-6fe0be44dcb8 04:46:09 | DEBUG | ComplianceTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 72557161-046c-4eb5-b3c6-6fe0be44dcb8 04:46:09 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify checks based on Integrations PASSED ComplianceTest > Verify checks based on Deployments STANDARD_OUT 04:46:09 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify checks based on Deployments 04:46:09 | INFO | ComplianceTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:46:09 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify checks based on Deployments SKIPPED ComplianceTest > Verify checks based on Policies STANDARD_OUT 04:46:09 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify checks based on Policies 04:46:09 | INFO | ComplianceTest | Services | Updated lifecycleStage of 'Fixable Severity at least Important' to [BUILD, DEPLOY] 04:46:19 | INFO | ComplianceTest | Services | Updated enforcement of 'Fixable Severity at least Important' to [FAIL_BUILD_ENFORCEMENT, SCALE_TO_ZERO_ENFORCEMENT] 04:46:30 | INFO | ComplianceTest | Services | Updated enforcement of 'Privileged Container' to [SCALE_TO_ZERO_ENFORCEMENT] 04:46:40 | INFO | ComplianceTest | Services | Updated enforcement of '90-Day Image Age' to [FAIL_BUILD_ENFORCEMENT, SCALE_TO_ZERO_ENFORCEMENT] 04:46:50 | INFO | ComplianceTest | Services | Updated enforcement of 'Latest tag' to [FAIL_BUILD_ENFORCEMENT, SCALE_TO_ZERO_ENFORCEMENT] 04:47:00 | INFO | ComplianceTest | Services | Updated enforcement of 'Ubuntu Package Manager Execution' to [KILL_POD_ENFORCEMENT] 04:47:11 | INFO | ComplianceTest | Services | Updated enforcement of 'Environment Variable Contains Secret' to [SCALE_TO_ZERO_ENFORCEMENT] 04:47:11 | ERROR | ComplianceTest | PolicyService | error creating new policy io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid error: error validating lifecycle stage error: policy configuration is invalid for deploy time: policy validation error: validation of section "" error: policy criteria "Environment Variable" has invalid value[0]=".*SECRET.*=.*" must match regex "((?m)^(?i:(UNSET|RAW|UNKNOWN|^)=([^=]*)=.*)|((SECRET_KEY|CONFIG_MAP_KEY|FIELD|RESOURCE_FIELD)=([^=]*)=$)$)": invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.postPolicy(PolicyServiceGrpc.java:1022) [3 skipped] at services.PolicyService.createNewPolicy(PolicyService.groovy:31) [1 skipped] at ComplianceTest.$spock_feature_1_12(ComplianceTest.groovy:881) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:47:11 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:47:11 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered NIST_800_190 compliance run 04:47:11 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:47:18 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 7.121s 04:47:18 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:47:18 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered NIST_SP_800_53_Rev_4 compliance run 04:47:18 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:47:25 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 7.12s 04:47:25 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_800_190:4_1_1 04:47:25 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_800_190:4_1_2 04:47:25 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_800_190:4_1_4 04:47:25 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_800_190:4_2_2 04:47:25 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_SP_800_53_Rev_4:CM_2 04:47:25 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_SP_800_53_Rev_4:CM_3 04:47:25 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_SP_800_53_Rev_4:IR_4_(5) 04:47:35 | INFO | ComplianceTest | Services | Updated enforcement of 'Fixable Severity at least Important' to [FAIL_BUILD_ENFORCEMENT] 04:47:45 | INFO | ComplianceTest | Services | Updated enforcement of 'Privileged Container' to have no enforcement actions 04:47:55 | INFO | ComplianceTest | Services | Updated enforcement of '90-Day Image Age' to have no enforcement actions 04:48:05 | INFO | ComplianceTest | Services | Updated enforcement of 'Latest tag' to have no enforcement actions 04:48:16 | INFO | ComplianceTest | Services | Updated enforcement of 'Ubuntu Package Manager Execution' to have no enforcement actions 04:48:26 | INFO | ComplianceTest | Services | Updated enforcement of 'Environment Variable Contains Secret' to have no enforcement actions 04:48:26 | INFO | ComplianceTest | Services | Updated lifecycleStage of 'Fixable CVSS >= 7' to [DEPLOY] 04:48:26 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify checks based on Policies PASSED ComplianceTest > Verify controls that rely on CIS Benchmarks STANDARD_OUT 04:48:26 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify controls that rely on CIS Benchmarks 04:48:26 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:48:26 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered PCI_DSS_3_2 compliance run 04:48:26 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:48:33 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 7.119s 04:48:33 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:48:33 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered NIST_800_190 compliance run 04:48:33 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:48:40 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 7.119s 04:48:40 | INFO | ComplianceTest | ComplianceTest | Validating cluster control PCI_DSS_3_2:2_2 04:48:40 | INFO | ComplianceTest | ComplianceTest | Validating cluster control NIST_800_190:4_3_5 04:48:40 | INFO | ComplianceTest | ComplianceTest | Validating cluster control NIST_800_190:4_4_3 04:48:40 | INFO | ComplianceTest | ComplianceTest | Validating cluster control NIST_800_190:4_5_1 04:48:40 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify controls that rely on CIS Benchmarks PASSED ComplianceTest > Verify Tailored Profile does not have evidence for disabled rule SKIPPED ComplianceTest > Verify Compliance Operator aggregation results on OpenShift for cluster results SKIPPED ComplianceTest > Verify controls that checks for fixable CVEs STANDARD_OUT 04:48:40 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify controls that checks for fixable CVEs 04:48:40 | DEBUG | ComplianceTest | OpenShift | Namespace qa already exists 04:48:40 | DEBUG | ComplianceTest | Kubernetes | Told the orchestrator to createOrReplace cve-compliance-deployment 04:48:40 | DEBUG | ComplianceTest | Kubernetes | Waiting for cve-compliance-deployment to start 04:48:40 | DEBUG | ComplianceTest | Kubernetes | Status of cve-compliance-deployment's pods: 04:48:40 | DEBUG | ComplianceTest | Kubernetes | - cve-compliance-deployment-6b54469594-kws9h Container status: [] 04:48:40 | DEBUG | ComplianceTest | Kubernetes | 0/1 are in the ready state for cve-compliance-deployment 04:48:43 | DEBUG | ComplianceTest | Kubernetes | Waiting for cve-compliance-deployment to start 04:48:44 | DEBUG | ComplianceTest | Kubernetes | Status of cve-compliance-deployment's pods: 04:48:44 | DEBUG | ComplianceTest | Kubernetes | - cve-compliance-deployment-6b54469594-kws9h Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:48:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:48:44 | DEBUG | ComplianceTest | Kubernetes | All 1 replicas found in ready state for cve-compliance-deployment 04:48:44 | DEBUG | ComplianceTest | Kubernetes | Took 3 seconds for k8s deployment cve-compliance-deployment 04:48:44 | DEBUG | ComplianceTest | Kubernetes | Updating deployment cve-compliance-deployment with 1 pods 04:48:44 | INFO | ComplianceTest | ComplianceTest | Image not found or not scanned: null 04:48:44 | INFO | ComplianceTest | ComplianceTest | Found scanned image name: "quay.io/rhacs-eng/qa-multi-arch:nginx-1.12@sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728" components: 80 cves: 285 fixable_cves: 151 created { seconds: 1525096632 nanos: 489317377 } id: "sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728" last_updated { seconds: 1761885236 nanos: 17729104 } priority: 4 04:48:44 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:48:44 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered PCI_DSS_3_2 compliance run 04:48:44 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:48:51 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 7.119s 04:48:51 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:48:51 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered HIPAA_164 compliance run 04:48:51 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:48:58 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 7.12s 04:48:58 | INFO | ComplianceTest | ComplianceTest | Validating PCI_DSS_3_2:6_2 04:48:58 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:306_e 04:48:58 | DEBUG | ComplianceTest | Kubernetes | Removed the deployment: cve-compliance-deployment 04:48:58 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify controls that checks for fixable CVEs PASSED ComplianceTest > Verify Compliance aggregation cache cleared after each compliance run STANDARD_OUT 04:48:58 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify Compliance aggregation cache cleared after each compliance run 04:48:58 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:48:58 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered all compliance runs 04:48:58 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the runs to finish... 04:49:05 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance runs took 7.12s 04:49:05 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify Compliance aggregation cache cleared after each compliance run PASSED ComplianceTest > Verify ComplianceRuns with SAC on clusters with wildcard STANDARD_OUT 04:49:05 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify ComplianceRuns with SAC on clusters with wildcard 04:49:05 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:49:06 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered * compliance run 04:49:06 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:49:13 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 7.128s 04:49:13 | INFO | ComplianceTest | RoleService | Deleted role: Compliance Test Automation Role 20c733c4-0145-4a13-813f-a4a9e42ca9a2 and permission set 04:49:13 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify ComplianceRuns with SAC on clusters with wildcard PASSED ComplianceTest STANDARD_OUT 04:49:13 | DEBUG | ComplianceTest | ImageIntegrationService | Image integration deleted: f25ebe42-fc96-4d10-aa96-eb18178f20c8 04:49:13 | INFO | ComplianceTest | ComplianceTest | Ending testsuite 04:49:13 | INFO | ComplianceTest | ComplianceTest | Checking if cluster is healthy after test 04:49:13 | DEBUG | ComplianceTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries DefaultPoliciesTest STANDARD_OUT 04:49:13 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testsuite 04:49:13 | DEBUG | DefaultPoliciesTest | ImageIntegrationService | Integration tested: gcr 04:49:14 | DEBUG | DefaultPoliciesTest | ImageIntegrationService | Integration created: gcr: 0ab37049-cc22-4860-a9ad-b81c8e2a42b9 04:49:14 | DEBUG | DefaultPoliciesTest | ImageIntegrationService | Integration found after creation: gcr: 0ab37049-cc22-4860-a9ad-b81c8e2a42b9 04:49:14 | DEBUG | DefaultPoliciesTest | ImageService | Deleted 2 images based on Image:quay.io/rhacs-eng/qa-multi-arch-nginx:latest 04:49:14 | DEBUG | DefaultPoliciesTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:struts-app 04:49:14 | DEBUG | DefaultPoliciesTest | ImageService | Deleted 0 images based on Image:quay.io/rhacs-eng/qa-multi-arch:trigger-policy-violations-most-v1 04:49:14 | DEBUG | DefaultPoliciesTest | ImageService | Deleted 0 images based on Image:us.gcr.io/acs-san-stackroxci/qa-multi-arch:nginx-1.12 04:49:14 | DEBUG | DefaultPoliciesTest | ImageService | Deleted 0 images based on Image:registry.redhat.io/redhat/community-operator-index:v4.19 04:49:14 | DEBUG | DefaultPoliciesTest | ImageService | Deleted 0 images based on Image:quay.io/rhacs-eng/qa:struts-app 04:49:14 | DEBUG | DefaultPoliciesTest | OpenShift | Namespace qa already exists 04:49:14 | DEBUG | DefaultPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace qadefpolnginxlatest 04:49:14 | DEBUG | DefaultPoliciesTest | OpenShift | Namespace qa already exists 04:49:14 | DEBUG | DefaultPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace qadefpolstruts 04:49:14 | DEBUG | DefaultPoliciesTest | OpenShift | Namespace qa already exists 04:49:14 | DEBUG | DefaultPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace qadefpoltriggermost 04:49:14 | DEBUG | DefaultPoliciesTest | OpenShift | Namespace qa already exists 04:49:14 | DEBUG | DefaultPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace qadefpolnginx 04:49:14 | DEBUG | DefaultPoliciesTest | OpenShift | Namespace qa already exists 04:49:14 | DEBUG | DefaultPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace qadefpolunsignedredhat 04:49:14 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolnginxlatest to start 04:49:14 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolnginxlatest's pods: 04:49:14 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolnginxlatest-d556f67bd-4jrcm Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:49:14 | DEBUG | DefaultPoliciesTest | Kubernetes | 0/1 are in the ready state for qadefpolnginxlatest 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolnginxlatest to start 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolnginxlatest's pods: 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolnginxlatest-d556f67bd-4jrcm Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:49:15Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | All 1 replicas found in ready state for qadefpolnginxlatest 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Took 3 seconds for k8s deployment qadefpolnginxlatest 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Updating deployment qadefpolnginxlatest with 1 pods 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolstruts to start 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolstruts's pods: 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolstruts-5465db9d46-bcxzg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:49:15Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | All 1 replicas found in ready state for qadefpolstruts 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Took 0 seconds for k8s deployment qadefpolstruts 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Updating deployment qadefpolstruts with 1 pods 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpoltriggermost to start 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpoltriggermost's pods: 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpoltriggermost-768f769d78-wtppq Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:49:15Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | All 1 replicas found in ready state for qadefpoltriggermost 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Took 0 seconds for k8s deployment qadefpoltriggermost 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Updating deployment qadefpoltriggermost with 1 pods 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolnginx to start 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolnginx's pods: 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolnginx-c45ff6f46-jwkxw Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:49:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | All 1 replicas found in ready state for qadefpolnginx 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Took 0 seconds for k8s deployment qadefpolnginx 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Updating deployment qadefpolnginx with 1 pods 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolunsignedredhat to start 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolunsignedredhat's pods: 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolunsignedredhat-78d67c6d5d-f6tzv Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:49:17 | DEBUG | DefaultPoliciesTest | Kubernetes | 0/1 are in the ready state for qadefpolunsignedredhat 04:49:20 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolunsignedredhat to start 04:49:20 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolunsignedredhat's pods: 04:49:21 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolunsignedredhat-78d67c6d5d-f6tzv Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:49:21 | DEBUG | DefaultPoliciesTest | Kubernetes | 0/1 are in the ready state for qadefpolunsignedredhat 04:49:24 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolunsignedredhat to start 04:49:24 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolunsignedredhat's pods: 04:49:24 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolunsignedredhat-78d67c6d5d-f6tzv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:49:23Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:49:24 | DEBUG | DefaultPoliciesTest | Kubernetes | All 1 replicas found in ready state for qadefpolunsignedredhat 04:49:24 | DEBUG | DefaultPoliciesTest | Kubernetes | Took 6 seconds for k8s deployment qadefpolunsignedredhat 04:49:24 | DEBUG | DefaultPoliciesTest | Kubernetes | Updating deployment qadefpolunsignedredhat with 1 pods 04:49:24 | DEBUG | DefaultPoliciesTest | Kubernetes | qadefpolstruts: Service created 04:49:24 | INFO | DefaultPoliciesTest | Services | SR found deployment qadefpolnginxlatest within 0s 04:49:24 | INFO | DefaultPoliciesTest | Services | SR found deployment qadefpolstruts within 0s 04:49:24 | INFO | DefaultPoliciesTest | Services | SR found deployment qadefpoltriggermost within 0s 04:49:24 | INFO | DefaultPoliciesTest | Services | SR found deployment qadefpolnginx within 0s 04:49:24 | INFO | DefaultPoliciesTest | Services | SR found deployment qadefpolunsignedredhat within 0s 04:49:24 | DEBUG | DefaultPoliciesTest | Helpers | Will scan quay.io/rhacs-eng/qa:struts-app to default-policies-test-struts-app.json 04:49:24 | WARN | DefaultPoliciesTest | Helpers | Failed to scan the image. Exit: 1 Stderr: DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Secure Shell (ssh) Port Exposed is triggered STANDARD_OUT 04:49:24 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Secure Shell (ssh) Port Exposed is triggered 04:49:24 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:24 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:49:24 | INFO | DefaultPoliciesTest | Services | Secure Shell (ssh) Port Exposed triggered after waiting 0 seconds 04:49:24 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Secure Shell (ssh) Port Exposed is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Latest tag is triggered STANDARD_OUT 04:49:24 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Latest tag is triggered 04:49:24 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:24 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:49:24 | INFO | DefaultPoliciesTest | Services | Latest tag triggered after waiting 0 seconds 04:49:24 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Latest tag is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Environment Variable Contains Secret is triggered STANDARD_OUT 04:49:24 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Environment Variable Contains Secret is triggered 04:49:24 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:24 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:49:24 | INFO | DefaultPoliciesTest | Services | Environment Variable Contains Secret triggered after waiting 0 seconds 04:49:24 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Environment Variable Contains Secret is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Apache Struts: CVE-2017-5638 is triggered STANDARD_OUT 04:49:24 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Apache Struts: CVE-2017-5638 is triggered 04:49:24 | WARN | DefaultPoliciesTest | DefaultPoliciesTest | [ROX-11612] CVE-2017-5638 is absent from image scan 04:49:24 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:24 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:49:24 | INFO | DefaultPoliciesTest | Services | Apache Struts: CVE-2017-5638 triggered after waiting 0 seconds 04:49:24 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Apache Struts: CVE-2017-5638 is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Wget in Image is triggered STANDARD_OUT 04:49:24 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Wget in Image is triggered 04:49:24 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Temporarily enabled policy 'Wget in Image' 04:49:24 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:27 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:27 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:49:27 | INFO | DefaultPoliciesTest | Services | Wget in Image triggered after waiting 3 seconds 04:49:28 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Re-disabled policy 'Wget in Image' 04:49:28 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:28 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolstruts' has 1 violation(s) for 'Wget in Image' 04:49:31 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:31 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolstruts' has 0 violation(s) for 'Wget in Image' 04:49:31 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Wget in Image is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy 90-Day Image Age is triggered STANDARD_OUT 04:49:31 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy 90-Day Image Age is triggered 04:49:31 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:31 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:49:31 | INFO | DefaultPoliciesTest | Services | 90-Day Image Age triggered after waiting 0 seconds 04:49:31 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy 90-Day Image Age is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Ubuntu Package Manager in Image is triggered STANDARD_OUT 04:49:31 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Ubuntu Package Manager in Image is triggered 04:49:31 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:31 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:49:31 | INFO | DefaultPoliciesTest | Services | Ubuntu Package Manager in Image triggered after waiting 0 seconds 04:49:31 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Ubuntu Package Manager in Image is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Fixable CVSS >= 7 is triggered STANDARD_OUT 04:49:31 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Fixable CVSS >= 7 is triggered 04:49:31 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Temporarily enabled policy 'Fixable CVSS >= 7' 04:49:31 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:34 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:34 | INFO | DefaultPoliciesTest | Services | violation size is: 2 04:49:34 | INFO | DefaultPoliciesTest | Services | Fixable CVSS >= 7 triggered after waiting 3 seconds 04:49:34 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Re-disabled policy 'Fixable CVSS >= 7' 04:49:34 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:34 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolnginx' has 2 violation(s) for 'Fixable CVSS >= 7' 04:49:37 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:37 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolnginx' has 0 violation(s) for 'Fixable CVSS >= 7' 04:49:37 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Fixable CVSS >= 7 is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Curl in Image is triggered STANDARD_OUT 04:49:37 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Curl in Image is triggered 04:49:37 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Temporarily enabled policy 'Curl in Image' 04:49:37 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:40 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:40 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:49:40 | INFO | DefaultPoliciesTest | Services | Curl in Image triggered after waiting 3 seconds 04:49:40 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Re-disabled policy 'Curl in Image' 04:49:40 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:40 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolstruts' has 1 violation(s) for 'Curl in Image' 04:49:43 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:43 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolstruts' has 0 violation(s) for 'Curl in Image' 04:49:43 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Curl in Image is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Red Hat images must be signed by a Red Hat release key is triggered STANDARD_OUT 04:49:43 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Red Hat images must be signed by a Red Hat release key is triggered 04:49:43 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Temporarily enabled policy 'Red Hat images must be signed by a Red Hat release key' 04:49:43 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:47 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:47 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:49:47 | INFO | DefaultPoliciesTest | Services | Red Hat images must be signed by a Red Hat release key triggered after waiting 3 seconds 04:49:47 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Re-disabled policy 'Red Hat images must be signed by a Red Hat release key' 04:49:47 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:47 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolunsignedredhat' has 1 violation(s) for 'Red Hat images must be signed by a Red Hat release key' 04:49:50 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:50 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolunsignedredhat' has 0 violation(s) for 'Red Hat images must be signed by a Red Hat release key' 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Red Hat images must be signed by a Red Hat release key is triggered PASSED DefaultPoliciesTest > Verify that Kubernetes Dashboard violation is generated STANDARD_OUT 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify that Kubernetes Dashboard violation is generated 04:49:50 | INFO | DefaultPoliciesTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify that Kubernetes Dashboard violation is generated SKIPPED DefaultPoliciesTest > Notifier for StackRox images with fixable vulns SKIPPED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Policy Violations STANDARD_OUT 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Policy Violations 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 1ms: Policy Violations 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Policy Violations PASSED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Service Reachability STANDARD_OUT 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Service Reachability 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 0ms: Service Reachability 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Service Reachability PASSED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Image Vulnerabilities STANDARD_OUT 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Image Vulnerabilities 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 0ms: Image Vulnerabilities 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Image Vulnerabilities PASSED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Service Configuration STANDARD_OUT 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Service Configuration 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 0ms: Service Configuration 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Service Configuration PASSED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Components Useful for Attackers STANDARD_OUT 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Components Useful for Attackers 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 0ms: Components Useful for Attackers 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Components Useful for Attackers PASSED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Number of Components in Image STANDARD_OUT 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Number of Components in Image 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 0ms: Number of Components in Image 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Number of Components in Image PASSED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Image Freshness STANDARD_OUT 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Image Freshness 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 0ms: Image Freshness 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Image Freshness PASSED DefaultPoliciesTest > Verify that built-in services don't trigger unexpected alerts STANDARD_OUT 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify that built-in services don't trigger unexpected alerts 04:49:50 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify that built-in services don't trigger unexpected alerts PASSED DefaultPoliciesTest > Verify that alert groups API is consistent with alerts STANDARD_OUT 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify that alert groups API is consistent with alerts 04:49:50 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getAlertGroups with 3 retries 04:49:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify that alert groups API is consistent with alerts PASSED DefaultPoliciesTest STANDARD_OUT 04:49:50 | DEBUG | DefaultPoliciesTest | Kubernetes | Removed the deployment: qadefpolnginxlatest 04:49:50 | DEBUG | DefaultPoliciesTest | Kubernetes | Removed the deployment: qadefpolstruts 04:49:50 | DEBUG | DefaultPoliciesTest | Kubernetes | Removed the deployment: qadefpoltriggermost 04:49:50 | DEBUG | DefaultPoliciesTest | Kubernetes | Removed the deployment: qadefpolnginx 04:49:50 | DEBUG | DefaultPoliciesTest | Kubernetes | Removed the deployment: qadefpolunsignedredhat 04:49:50 | DEBUG | DefaultPoliciesTest | ImageIntegrationService | Image integration deleted: 0ab37049-cc22-4860-a9ad-b81c8e2a42b9 04:49:51 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testsuite 04:49:51 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Checking if cluster is healthy after test 04:49:51 | DEBUG | DefaultPoliciesTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries DeploymentCheck STANDARD_OUT 04:49:51 | INFO | DeploymentCheck | DeploymentCheck | Starting testsuite 04:49:51 | DEBUG | DeploymentCheck | Kubernetes | check-deployments: NetworkPolicy created: 04:49:51 | DEBUG | DeploymentCheck | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: check-deployments namespace: check-deployments ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: app: check-deployments policyTypes: - Ingress DeploymentCheck > Test Deployment Check - Filtered by Category STANDARD_OUT 04:49:51 | INFO | DeploymentCheck | DeploymentCheck | Starting testcase: Test Deployment Check - Filtered by Category 04:49:51 | INFO | DeploymentCheck | DeploymentCheck | Ending testcase DeploymentCheck > Test Deployment Check - Filtered by Category PASSED DeploymentCheck > Test Deployment Check - Single Deployment STANDARD_OUT 04:49:51 | INFO | DeploymentCheck | DeploymentCheck | Starting testcase: Test Deployment Check - Single Deployment 04:49:54 | INFO | DeploymentCheck | DeploymentCheck | Got remarks: [name: "check-deployments" permission_level: "CLUSTER_ADMIN" applied_network_policies: "check-deployments" ] 04:49:54 | INFO | DeploymentCheck | DeploymentCheck | Ending testcase DeploymentCheck > Test Deployment Check - Single Deployment PASSED DeploymentCheck > Test Deployment Check - Multiple Deployments STANDARD_OUT 04:49:54 | INFO | DeploymentCheck | DeploymentCheck | Starting testcase: Test Deployment Check - Multiple Deployments 04:49:58 | INFO | DeploymentCheck | DeploymentCheck | Got remarks: [name: "check-deployments" permission_level: "CLUSTER_ADMIN" applied_network_policies: "check-deployments" , name: "de2" permission_level: "CLUSTER_ADMIN" ] 04:49:58 | INFO | DeploymentCheck | DeploymentCheck | Ending testcase DeploymentCheck > Test Deployment Check - Multiple Deployments PASSED DeploymentCheck STANDARD_OUT 04:49:58 | DEBUG | DeploymentCheck | Kubernetes | check-deployments: NetworkPolicy removed. 04:49:58 | DEBUG | DeploymentCheck | Kubernetes | Waiting for namespace check-deployments to be deleted 04:49:58 | DEBUG | DeploymentCheck | Kubernetes | Retrying in 3... 04:50:01 | DEBUG | DeploymentCheck | Kubernetes | Retrying in 3... 04:50:04 | DEBUG | DeploymentCheck | Kubernetes | K8s found that namespace check-deployments was deleted 04:50:04 | DEBUG | DeploymentCheck | Kubernetes | Waiting for namespace check-deployments to be deleted 04:50:04 | DEBUG | DeploymentCheck | Kubernetes | K8s found that namespace check-deployments was deleted 04:50:05 | INFO | DeploymentCheck | DeploymentCheck | Ending testsuite 04:50:05 | INFO | DeploymentCheck | DeploymentCheck | Checking if cluster is healthy after test 04:50:05 | DEBUG | DeploymentCheck | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries DeploymentEventGraphQLTest STANDARD_OUT 04:50:05 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | Starting testsuite 04:50:05 | DEBUG | DeploymentEventGraphQLTes | OpenShift | Namespace qa already exists 04:50:05 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Told the orchestrator to createOrReplace eventnginx 04:50:05 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Waiting for eventnginx to start 04:50:05 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Status of eventnginx's pods: 04:50:05 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | - eventnginx-5656b489b4-qkkjx Container status: [] 04:50:05 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | 0/1 are in the ready state for eventnginx 04:50:08 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Waiting for eventnginx to start 04:50:08 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Status of eventnginx's pods: 04:50:08 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | - eventnginx-5656b489b4-qkkjx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:50:05Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:50:08 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | All 1 replicas found in ready state for eventnginx 04:50:08 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Took 3 seconds for k8s deployment eventnginx 04:50:08 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Updating deployment eventnginx with 1 pods 04:50:08 | INFO | DeploymentEventGraphQLTes | Services | SR found deployment eventnginx within 0s DeploymentEventGraphQLTest > Verify Deployment Events in GraphQL STANDARD_OUT 04:50:08 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | Starting testcase: Verify Deployment Events in GraphQL 04:50:08 | DEBUG | DeploymentEventGraphQLTes | Helpers | Calling services.AlertService.getViolations with 3 retries 04:50:11 | DEBUG | DeploymentEventGraphQLTes | Helpers | Calling services.AlertService.getViolations with 3 retries 04:50:11 | INFO | DeploymentEventGraphQLTes | Services | violation size is: 1 04:50:11 | INFO | DeploymentEventGraphQLTes | Services | Ubuntu Package Manager Execution triggered after waiting 3 seconds 04:50:41 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getDeploymentEventsOverview($deploymentId: ID!) {\n result: deployment(id: $deploymentId) {\n numPolicyViolations: failingRuntimePolicyCount\n numProcessActivities: processActivityCount\n numRestarts: containerRestartCount\n numTerminations: containerTerminationCount\n numTotalPods: podCount\n }\n }","variables":{"deploymentId":"b6d3c7f6-5480-4d9a-9a66-ecf5b09a2129"}} 04:50:41 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":{"numPolicyViolations":1,"numProcessActivities":3,"numRestarts":0,"numTerminations":0,"numTotalPods":1}}} 04:50:41 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:50:41 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: b6d3c7f6-5480-4d9a-9a66-ecf5b09a2129"}} 04:50:41 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"c8e3b2e0-4681-50bc-a32c-544eb7b24647","name":"eventnginx-5656b489b4-qkkjx","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-10-31T04:50:09.127020737Z"}]}]}} 04:50:41 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:50:41 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 0 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:50:45 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: b6d3c7f6-5480-4d9a-9a66-ecf5b09a2129"}} 04:50:45 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"c8e3b2e0-4681-50bc-a32c-544eb7b24647","name":"eventnginx-5656b489b4-qkkjx","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-10-31T04:50:09.127020737Z"}]}]}} 04:50:45 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:50:45 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 1 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:50:49 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: b6d3c7f6-5480-4d9a-9a66-ecf5b09a2129"}} 04:50:49 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"c8e3b2e0-4681-50bc-a32c-544eb7b24647","name":"eventnginx-5656b489b4-qkkjx","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-10-31T04:50:09.127020737Z"}]}]}} 04:50:49 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:50:49 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 2 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:50:53 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: b6d3c7f6-5480-4d9a-9a66-ecf5b09a2129"}} 04:50:53 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"c8e3b2e0-4681-50bc-a32c-544eb7b24647","name":"eventnginx-5656b489b4-qkkjx","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-10-31T04:50:09.127020737Z"}]}]}} 04:50:53 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:50:53 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 3 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:50:57 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: b6d3c7f6-5480-4d9a-9a66-ecf5b09a2129"}} 04:50:57 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"c8e3b2e0-4681-50bc-a32c-544eb7b24647","name":"eventnginx-5656b489b4-qkkjx","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-10-31T04:50:09.127020737Z"}]}]}} 04:50:57 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:50:57 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 4 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:51:01 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: b6d3c7f6-5480-4d9a-9a66-ecf5b09a2129"}} 04:51:02 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"c8e3b2e0-4681-50bc-a32c-544eb7b24647","name":"eventnginx-5656b489b4-qkkjx","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-10-31T04:50:09.127020737Z"}]}]}} 04:51:02 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:51:02 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 5 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:51:06 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: b6d3c7f6-5480-4d9a-9a66-ecf5b09a2129"}} 04:51:06 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"c8e3b2e0-4681-50bc-a32c-544eb7b24647","name":"eventnginx-5656b489b4-qkkjx","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-10-31T04:50:09.127020737Z"}]}]}} 04:51:06 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:51:06 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 6 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:51:10 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: b6d3c7f6-5480-4d9a-9a66-ecf5b09a2129"}} 04:51:10 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"c8e3b2e0-4681-50bc-a32c-544eb7b24647","name":"eventnginx-5656b489b4-qkkjx","containerCount":1,"events":[{"__typename":"ProcessActivityEvent","id":"7db06524-1781-51ae-9f21-161b5fd7e4d3","name":"/bin/sh","timestamp":"2025-10-31T04:50:05.990099502Z","args":"-c apt-get -y clean \u0026\u0026 sleep 600","uid":0,"parentName":null,"parentUid":-1,"inBaseline":true},{"__typename":"ProcessActivityEvent","id":"f9e0164c-aab5-5ab5-8641-0b726f1438f8","name":"/usr/bin/apt-get","timestamp":"2025-10-31T04:50:05.990842922Z","args":"-y clean","uid":0,"parentName":"/bin/sh","parentUid":0,"inBaseline":true},{"__typename":"ProcessActivityEvent","id":"8fe83ed4-0c06-5a6c-bf90-785ee230d017","name":"/bin/sleep","timestamp":"2025-10-31T04:50:05.997122541Z","args":"600","uid":0,"parentName":"/bin/sh","parentUid":0,"inBaseline":true},{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-10-31T04:50:09.127020737Z"}]}]}} 04:51:10 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:51:10 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getContainerEvents($containersQuery: String) {\n result: groupedContainerInstances(query: $containersQuery) {\n id\n podId\n name\n startTime\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"containersQuery":"Pod ID: c8e3b2e0-4681-50bc-a32c-544eb7b24647"}} 04:51:10 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"eventnginx-5656b489b4-qkkjx.qa@c8e3b2e0-4681-50bc-a32c-544eb7b24647:eventnginx","podId":"eventnginx-5656b489b4-qkkjx.qa@c8e3b2e0-4681-50bc-a32c-544eb7b24647","name":"eventnginx","startTime":"2025-10-31T04:50:05Z","events":[{"__typename":"ProcessActivityEvent","id":"7db06524-1781-51ae-9f21-161b5fd7e4d3","name":"/bin/sh","timestamp":"2025-10-31T04:50:05.990099502Z","args":"-c apt-get -y clean \u0026\u0026 sleep 600","uid":0,"parentName":null,"parentUid":-1,"inBaseline":true},{"__typename":"ProcessActivityEvent","id":"f9e0164c-aab5-5ab5-8641-0b726f1438f8","name":"/usr/bin/apt-get","timestamp":"2025-10-31T04:50:05.990842922Z","args":"-y clean","uid":0,"parentName":"/bin/sh","parentUid":0,"inBaseline":true},{"__typename":"ProcessActivityEvent","id":"8fe83ed4-0c06-5a6c-bf90-785ee230d017","name":"/bin/sleep","timestamp":"2025-10-31T04:50:05.997122541Z","args":"600","uid":0,"parentName":"/bin/sh","parentUid":0,"inBaseline":true},{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-9... 04:51:10 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:51:10 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | Ending testcase DeploymentEventGraphQLTest > Verify Deployment Events in GraphQL PASSED DeploymentEventGraphQLTest STANDARD_OUT 04:51:10 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Removed the deployment: eventnginx 04:51:10 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | Ending testsuite 04:51:10 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | Checking if cluster is healthy after test 04:51:10 | DEBUG | DeploymentEventGraphQLTes | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries DeploymentTest STANDARD_OUT 04:51:10 | INFO | DeploymentTest | DeploymentTest | Starting testsuite 04:51:10 | DEBUG | DeploymentTest | OpenShift | Namespace qa already exists 04:51:10 | DEBUG | DeploymentTest | Kubernetes | Told the orchestrator to createOrReplace image-join 04:51:10 | DEBUG | DeploymentTest | Kubernetes | Waiting for image-join to start 04:51:10 | DEBUG | DeploymentTest | Kubernetes | Status of image-join's pods: 04:51:10 | DEBUG | DeploymentTest | Kubernetes | - image-join-7dbf8bd756-ql5r2 Container status: [] 04:51:10 | DEBUG | DeploymentTest | Kubernetes | 0/1 are in the ready state for image-join 04:51:13 | DEBUG | DeploymentTest | Kubernetes | Waiting for image-join to start 04:51:13 | DEBUG | DeploymentTest | Kubernetes | Status of image-join's pods: 04:51:13 | DEBUG | DeploymentTest | Kubernetes | - image-join-7dbf8bd756-ql5r2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:51:11Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:51:13 | DEBUG | DeploymentTest | Kubernetes | All 1 replicas found in ready state for image-join 04:51:13 | DEBUG | DeploymentTest | Kubernetes | Took 3 seconds for k8s deployment image-join 04:51:13 | DEBUG | DeploymentTest | Kubernetes | Updating deployment image-join with 1 pods 04:51:21 | INFO | DeploymentTest | Services | SR found vulnerabilities for the image quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad within 6s DeploymentTest > Verify deployment of type Job is deleted once it completes STANDARD_OUT 04:51:21 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment of type Job is deleted once it completes 04:51:21 | DEBUG | DeploymentTest | OpenShift | Namespace qa already exists 04:51:21 | DEBUG | DeploymentTest | Kubernetes | Told the orchestrator to create job test-job-pi 04:51:21 | INFO | DeploymentTest | Services | SR found deployment test-job-pi within 0s 04:51:28 | INFO | DeploymentTest | Services | SR does not detect the deployment test-job-pi yet: io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id 'affdff66-7cb3-4f79-9c06-e3f5b22272b4' does not exist: not found 04:51:28 | DEBUG | DeploymentTest | Kubernetes | test-job-pi: job removed. 04:51:28 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment of type Job is deleted once it completes PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad STANDARD_OUT 04:51:28 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad 04:51:28 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image Sha:sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e STANDARD_OUT 04:51:28 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Image Sha:sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e 04:51:28 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image Sha:sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links CVE:CVE-2018-18314 STANDARD_OUT 04:51:28 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links CVE:CVE-2018-18314 04:51:28 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links CVE:CVE-2018-18314 PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links CVE:CVE-2018-18314+Fixable:true STANDARD_OUT 04:51:28 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links CVE:CVE-2018-18314+Fixable:true 04:51:28 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links CVE:CVE-2018-18314+Fixable:true PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Deployment:image-join+Image:r/quay.io.* STANDARD_OUT 04:51:28 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Deployment:image-join+Image:r/quay.io.* 04:51:28 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Deployment:image-join+Image:r/quay.io.* PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image:r/quay.io.* STANDARD_OUT 04:51:28 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Image:r/quay.io.* 04:51:28 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image:r/quay.io.* PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image:!stackrox.io STANDARD_OUT 04:51:28 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Image:!stackrox.io 04:51:29 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image:!stackrox.io PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Deployment:image-join+Image:!stackrox.io STANDARD_OUT 04:51:29 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Deployment:image-join+Image:!stackrox.io 04:51:29 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Deployment:image-join+Image:!stackrox.io PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image Remote:rhacs-eng/qa-multi-arch+Image Registry:quay.io STANDARD_OUT 04:51:29 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Image Remote:rhacs-eng/qa-multi-arch+Image Registry:quay.io 04:51:29 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image Remote:rhacs-eng/qa-multi-arch+Image Registry:quay.io PASSED DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Deployment:image-join STANDARD_OUT 04:51:29 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify image -> deployment links Deployment:image-join 04:51:29 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Deployment:image-join PASSED DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Label:app=test STANDARD_OUT 04:51:29 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify image -> deployment links Label:app=test 04:51:35 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Label:app=test PASSED DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad STANDARD_OUT 04:51:35 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify image -> deployment links Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad 04:51:35 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad PASSED DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Label:app=test+Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad STANDARD_OUT 04:51:35 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify image -> deployment links Label:app=test+Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad 04:51:35 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Label:app=test+Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad PASSED DeploymentTest > Verify GKE orchestrator deployment is marked appropriately > Verify GKE orchestrator deployment is marked appropriately [deploymentName: kube-dns, query: Deployment:kube-dns+Namespace:kube-system, result: true, #0] STANDARD_OUT 04:51:35 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify GKE orchestrator deployment is marked appropriately [deploymentName: kube-dns, query: Deployment:kube-dns+Namespace:kube-system, result: true, #0] 04:51:35 | INFO | DeploymentTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:51:35 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify GKE orchestrator deployment is marked appropriately > Verify GKE orchestrator deployment is marked appropriately [deploymentName: kube-dns, query: Deployment:kube-dns+Namespace:kube-system, result: true, #0] SKIPPED DeploymentTest > Verify GKE orchestrator deployment is marked appropriately > Verify GKE orchestrator deployment is marked appropriately [deploymentName: sensor, query: Deployment:sensor+Namespace:stackrox, result: false, #1] STANDARD_OUT 04:51:35 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify GKE orchestrator deployment is marked appropriately [deploymentName: sensor, query: Deployment:sensor+Namespace:stackrox, result: false, #1] 04:51:35 | INFO | DeploymentTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:51:35 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify GKE orchestrator deployment is marked appropriately > Verify GKE orchestrator deployment is marked appropriately [deploymentName: sensor, query: Deployment:sensor+Namespace:stackrox, result: false, #1] SKIPPED DeploymentTest > Verify Openshift orchestrator deployment is marked appropriately > Verify Openshift orchestrator deployment is marked appropriately [deploymentName: apiserver, query: Deployment:apiserver+Namespace:openshift-apiserver, result: true, #0] STANDARD_OUT 04:51:35 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify Openshift orchestrator deployment is marked appropriately [deploymentName: apiserver, query: Deployment:apiserver+Namespace:openshift-apiserver, result: true, #0] 04:51:35 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify Openshift orchestrator deployment is marked appropriately > Verify Openshift orchestrator deployment is marked appropriately [deploymentName: apiserver, query: Deployment:apiserver+Namespace:openshift-apiserver, result: true, #0] PASSED DeploymentTest > Verify Openshift orchestrator deployment is marked appropriately > Verify Openshift orchestrator deployment is marked appropriately [deploymentName: sensor, query: Deployment:sensor+Namespace:stackrox, result: false, #1] STANDARD_OUT 04:51:35 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify Openshift orchestrator deployment is marked appropriately [deploymentName: sensor, query: Deployment:sensor+Namespace:stackrox, result: false, #1] 04:51:35 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify Openshift orchestrator deployment is marked appropriately > Verify Openshift orchestrator deployment is marked appropriately [deploymentName: sensor, query: Deployment:sensor+Namespace:stackrox, result: false, #1] PASSED DeploymentTest STANDARD_OUT 04:51:35 | DEBUG | DeploymentTest | Kubernetes | Removed the deployment: image-join 04:51:35 | DEBUG | DeploymentTest | ImageService | Deleted 2 images based on Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad 04:51:35 | INFO | DeploymentTest | DeploymentTest | Ending testsuite 04:51:35 | INFO | DeploymentTest | DeploymentTest | Checking if cluster is healthy after test 04:51:35 | DEBUG | DeploymentTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries DiagnosticBundleTest STANDARD_OUT 04:51:36 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Starting testsuite DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download does not succeed without auth STANDARD_OUT 04:51:36 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Starting testcase: Test that diagnostic bundle download does not succeed without auth 04:51:36 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Ending testcase DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download does not succeed without auth PASSED DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download does not succeed with no access token STANDARD_OUT 04:51:36 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Starting testcase: Test that diagnostic bundle download does not succeed with no access token 04:51:36 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Ending testcase DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download does not succeed with no access token PASSED DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download succeeds with debug logs reader token STANDARD_OUT 04:51:36 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Starting testcase: Test that diagnostic bundle download succeeds with debug logs reader token 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file versions.json modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file logimbue-data.json modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file auth-providers.json modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file goroutine.txt modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file delegated-scanning-config.json modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file system-configuration.json modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file auth-provider-groups.json modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file mutex.pb.gz modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db.json modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file notifiers.json modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file metrics-1 modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db-pg-stats.json modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file access-control-roles.json modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file sensor-metrics/remote/metrics.prom modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file sensor-metrics/remote/heap.pb.gz modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file heap.pb.gz modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db-pg-analyze-stats.json modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db-pg-tuples.json modified at 2025-10-31T04:51:36Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/namespace-spec.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-7c9bf84889-ljwt9.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-7c9bf84889-ljwt9-logs-admission-control.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-7c9bf84889-qhbkl.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-7c9bf84889-qhbkl-logs-admission-control.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-7c9bf84889-tzjw7.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-7c9bf84889-tzjw7-logs-admission-control.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/pod-central-795644c465-msqhx.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/pod-central-795644c465-msqhx-logs-central.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/pod-central-db-84b98c8889-fzcq2.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/pod-central-db-84b98c8889-fzcq2-logs-central-db.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-cmgmb.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-cmgmb-logs-collector.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-cmgmb-logs-compliance.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-cmgmb-logs-node-inventory.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-dnv9p.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-dnv9p-logs-collector.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-dnv9p-logs-compliance.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-dnv9p-logs-node-inventory.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-nhmnm.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-nhmnm-logs-collector.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-nhmnm-logs-compliance.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-nhmnm-logs-node-inventory.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-pj5kz.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-pj5kz-logs-collector.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-pj5kz-logs-compliance.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-pj5kz-logs-node-inventory.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-s9bvx.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-s9bvx-logs-collector.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-s9bvx-logs-compliance.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-s9bvx-logs-node-inventory.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-v2g62.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-v2g62-logs-collector.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-v2g62-logs-compliance.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-v2g62-logs-node-inventory.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/pod-config-controller-5f68659754-56qpc.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/pod-config-controller-5f68659754-56qpc-logs-manager.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/pod-scanner-7487f9cbb8-mchmc.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/pod-scanner-7487f9cbb8-mchmc-logs-scanner.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/pod-scanner-db-74f98cd84d-7sg42.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/pod-scanner-db-74f98cd84d-7sg42-logs-db.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/pod-sensor-7b4784c4d5-r7xsl.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/pod-sensor-7b4784c4d5-r7xsl-logs-sensor.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/pod-webhookserver-84f798856c-55slf.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/pod-webhookserver-84f798856c-55slf-logs-webhookserver.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/deployment-admission-control.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/deployment-central.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/deployment-central-db.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/deployment-config-controller.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/deployment-scanner.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/deployment-scanner-db.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/deployment-sensor.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/deployment-webhookserver.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/daemonset-collector.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/replicaset-admission-control-7c9bf84889.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/replicaset-central-795644c465.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/replicaset-central-db-84b98c8889.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/replicaset-config-controller-5f68659754.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/replicaset-scanner-7487f9cbb8.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/replicaset-scanner-db-74f98cd84d.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/replicaset-sensor-7b4784c4d5.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/replicaset-webhookserver-84f798856c.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/configmap-admission-control.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-config.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-db-config.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-endpoints.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-external-db.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-injected-cabundle-stackrox-central-services.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-injected-cabundle-stackrox-secured-cluster-services.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/configmap-kube-root-ca.crt.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/configmap-openshift-service-ca.crt.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-scanner-config.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/configmap-sensor-past-instances.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-stackrox-central-helm.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-stackrox-secured-cluster-helm.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-tls-ca-bundle.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-admission-control.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-central.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-central-db.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-central-loadbalancer.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-scanner.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-scanner-db.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-sensor.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-sensor-webhook.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/service-webhookserver.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/securedcluster-stackrox-secured-cluster-services.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/central-stackrox-central-services.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-admission-control-dockercfg-p8bhn.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-admission-control-tls.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-builder-dockercfg-df9sv.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-admin-pass.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-db-dockercfg-75lrj.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-db-password.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-db-tls.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-default-tls-secret.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-dockercfg-vfb6p.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-htpasswd.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-monitoring-tls.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-stackrox-central-services-proxy-env.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-tls.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-collector-dockercfg-npd4p.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-collector-tls.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-config-controller-dockercfg-c7wx7.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-default-dockercfg-g7xzt.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-deployer-dockercfg-n4tck.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-helm-cluster-config.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-db-password.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-db-tls.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-dockercfg-lvf9z.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-tls.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-securedcluster-stackrox-secured-cluster-services-proxy-env.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sensor-dockercfg-jr4kf.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sensor-monitoring-tls.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sensor-tls.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-service-ca.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sh.helm.release.v1.stackrox-central-services.v1.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sh.helm.release.v1.stackrox-secured-cluster-services.v1.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sh.helm.release.v1.webhookserver.v1.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-stackrox.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-admission-control.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-collector.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner-db.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner-v4-db.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner-v4-indexer.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-sensor.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-webhook-server-certs.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/event-list.csv modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/namespace-spec.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-7c9bf84889-ljwt9.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-7c9bf84889-ljwt9-logs-admission-control.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-7c9bf84889-qhbkl.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-7c9bf84889-qhbkl-logs-admission-control.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-7c9bf84889-tzjw7.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-7c9bf84889-tzjw7-logs-admission-control.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/pod-central-795644c465-msqhx.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/pod-central-795644c465-msqhx-logs-central.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/pod-central-db-84b98c8889-fzcq2.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/pod-central-db-84b98c8889-fzcq2-logs-central-db.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-cmgmb.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-cmgmb-logs-collector.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-cmgmb-logs-compliance.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-cmgmb-logs-node-inventory.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-dnv9p.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-dnv9p-logs-collector.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-dnv9p-logs-compliance.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-dnv9p-logs-node-inventory.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-nhmnm.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-nhmnm-logs-collector.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-nhmnm-logs-compliance.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-nhmnm-logs-node-inventory.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-pj5kz.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-pj5kz-logs-collector.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-pj5kz-logs-compliance.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-pj5kz-logs-node-inventory.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-s9bvx.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-s9bvx-logs-collector.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-s9bvx-logs-compliance.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-s9bvx-logs-node-inventory.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-v2g62.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-v2g62-logs-collector.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-v2g62-logs-compliance.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-v2g62-logs-node-inventory.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/pod-config-controller-5f68659754-56qpc.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/pod-config-controller-5f68659754-56qpc-logs-manager.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/pod-scanner-7487f9cbb8-mchmc.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/pod-scanner-7487f9cbb8-mchmc-logs-scanner.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/pod-scanner-db-74f98cd84d-7sg42.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/pod-scanner-db-74f98cd84d-7sg42-logs-db.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/pod-sensor-7b4784c4d5-r7xsl.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/pod-sensor-7b4784c4d5-r7xsl-logs-sensor.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/pod-webhookserver-84f798856c-55slf.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/pod-webhookserver-84f798856c-55slf-logs-webhookserver.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/deployment-admission-control.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/deployment-central.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/deployment-central-db.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/deployment-config-controller.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/deployment-scanner.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/deployment-scanner-db.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/deployment-sensor.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/deployment-webhookserver.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/daemonset-collector.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/replicaset-admission-control-7c9bf84889.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/replicaset-central-795644c465.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/replicaset-central-db-84b98c8889.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/replicaset-config-controller-5f68659754.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/replicaset-scanner-7487f9cbb8.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/replicaset-scanner-db-74f98cd84d.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/replicaset-sensor-7b4784c4d5.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/replicaset-webhookserver-84f798856c.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/_ungrouped/configmap-admission-control.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-config.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-db-config.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-endpoints.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-external-db.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-injected-cabundle-stackrox-central-services.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-injected-cabundle-stackrox-secured-cluster-services.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/_ungrouped/configmap-kube-root-ca.crt.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/_ungrouped/configmap-openshift-service-ca.crt.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-scanner-config.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/configmap-sensor-past-instances.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-stackrox-central-helm.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-stackrox-secured-cluster-helm.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-tls-ca-bundle.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-admission-control.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-central.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-central-db.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-central-loadbalancer.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-scanner.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-scanner-db.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-sensor.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-sensor-webhook.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/service-webhookserver.yaml modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/event-list.csv modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/errors.txt modified at 2025-10-31T04:51:40Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file telemetry-data.json modified at 2025-10-31T04:51:56Z 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Ending testcase DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download succeeds with debug logs reader token PASSED DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download succeeds with admin access token STANDARD_OUT 04:51:56 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Starting testcase: Test that diagnostic bundle download succeeds with admin access token 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file versions.json modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file logimbue-data.json modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file goroutine.txt modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file auth-providers.json modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file delegated-scanning-config.json modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file system-configuration.json modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file mutex.pb.gz modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file notifiers.json modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file auth-provider-groups.json modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db.json modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file metrics-1 modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file access-control-roles.json modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db-pg-stats.json modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file sensor-metrics/remote/metrics.prom modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file sensor-metrics/remote/heap.pb.gz modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db-pg-analyze-stats.json modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file heap.pb.gz modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db-pg-tuples.json modified at 2025-10-31T04:51:57Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/namespace-spec.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-7c9bf84889-ljwt9.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-7c9bf84889-ljwt9-logs-admission-control.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-7c9bf84889-qhbkl.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-7c9bf84889-qhbkl-logs-admission-control.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-7c9bf84889-tzjw7.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-7c9bf84889-tzjw7-logs-admission-control.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/pod-central-795644c465-msqhx.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/pod-central-795644c465-msqhx-logs-central.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/pod-central-db-84b98c8889-fzcq2.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/pod-central-db-84b98c8889-fzcq2-logs-central-db.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-cmgmb.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-cmgmb-logs-collector.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-cmgmb-logs-compliance.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-cmgmb-logs-node-inventory.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-dnv9p.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-dnv9p-logs-collector.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-dnv9p-logs-compliance.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-dnv9p-logs-node-inventory.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-nhmnm.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-nhmnm-logs-collector.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-nhmnm-logs-compliance.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-nhmnm-logs-node-inventory.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-pj5kz.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-pj5kz-logs-collector.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-pj5kz-logs-compliance.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-pj5kz-logs-node-inventory.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-s9bvx.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-s9bvx-logs-collector.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-s9bvx-logs-compliance.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-s9bvx-logs-node-inventory.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-v2g62.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-v2g62-logs-collector.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-v2g62-logs-compliance.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-v2g62-logs-node-inventory.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/pod-config-controller-5f68659754-56qpc.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/pod-config-controller-5f68659754-56qpc-logs-manager.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/pod-scanner-7487f9cbb8-mchmc.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/pod-scanner-7487f9cbb8-mchmc-logs-scanner.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/pod-scanner-db-74f98cd84d-7sg42.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/pod-scanner-db-74f98cd84d-7sg42-logs-db.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/pod-sensor-7b4784c4d5-r7xsl.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/pod-sensor-7b4784c4d5-r7xsl-logs-sensor.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/pod-webhookserver-84f798856c-55slf.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/pod-webhookserver-84f798856c-55slf-logs-webhookserver.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/deployment-admission-control.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/deployment-central.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/deployment-central-db.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/deployment-config-controller.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/deployment-scanner.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/deployment-scanner-db.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/deployment-sensor.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/deployment-webhookserver.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/daemonset-collector.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/replicaset-admission-control-7c9bf84889.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/replicaset-central-795644c465.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/replicaset-central-db-84b98c8889.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/replicaset-config-controller-5f68659754.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/replicaset-scanner-7487f9cbb8.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/replicaset-scanner-db-74f98cd84d.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/replicaset-sensor-7b4784c4d5.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/replicaset-webhookserver-84f798856c.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/configmap-admission-control.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-config.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-db-config.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-endpoints.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-external-db.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-injected-cabundle-stackrox-central-services.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-injected-cabundle-stackrox-secured-cluster-services.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/configmap-kube-root-ca.crt.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/configmap-openshift-service-ca.crt.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-scanner-config.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/configmap-sensor-past-instances.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-stackrox-central-helm.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-stackrox-secured-cluster-helm.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-tls-ca-bundle.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-admission-control.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-central.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-central-db.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-central-loadbalancer.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-scanner.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-scanner-db.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-sensor.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-sensor-webhook.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/service-webhookserver.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/securedcluster-stackrox-secured-cluster-services.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/central-stackrox-central-services.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-admission-control-dockercfg-p8bhn.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-admission-control-tls.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-builder-dockercfg-df9sv.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-admin-pass.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-db-dockercfg-75lrj.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-db-password.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-db-tls.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-default-tls-secret.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-dockercfg-vfb6p.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-htpasswd.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-monitoring-tls.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-stackrox-central-services-proxy-env.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-tls.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-collector-dockercfg-npd4p.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-collector-tls.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-config-controller-dockercfg-c7wx7.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-default-dockercfg-g7xzt.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-deployer-dockercfg-n4tck.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-helm-cluster-config.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-db-password.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-db-tls.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-dockercfg-lvf9z.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-tls.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-securedcluster-stackrox-secured-cluster-services-proxy-env.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sensor-dockercfg-jr4kf.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sensor-monitoring-tls.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sensor-tls.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-service-ca.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sh.helm.release.v1.stackrox-central-services.v1.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sh.helm.release.v1.stackrox-secured-cluster-services.v1.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sh.helm.release.v1.webhookserver.v1.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-stackrox.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-admission-control.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-collector.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner-db.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner-v4-db.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner-v4-indexer.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-sensor.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-webhook-server-certs.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/event-list.csv modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/namespace-spec.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-7c9bf84889-ljwt9.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-7c9bf84889-ljwt9-logs-admission-control.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-7c9bf84889-qhbkl.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-7c9bf84889-qhbkl-logs-admission-control.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-7c9bf84889-tzjw7.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-7c9bf84889-tzjw7-logs-admission-control.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/pod-central-795644c465-msqhx.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/pod-central-795644c465-msqhx-logs-central.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/pod-central-db-84b98c8889-fzcq2.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/pod-central-db-84b98c8889-fzcq2-logs-central-db.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-cmgmb.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-cmgmb-logs-collector.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-cmgmb-logs-compliance.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-cmgmb-logs-node-inventory.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-dnv9p.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-dnv9p-logs-collector.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-dnv9p-logs-compliance.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-dnv9p-logs-node-inventory.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-nhmnm.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-nhmnm-logs-collector.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-nhmnm-logs-compliance.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-nhmnm-logs-node-inventory.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-pj5kz.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-pj5kz-logs-collector.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-pj5kz-logs-compliance.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-pj5kz-logs-node-inventory.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-s9bvx.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-s9bvx-logs-collector.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-s9bvx-logs-compliance.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-s9bvx-logs-node-inventory.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-v2g62.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-v2g62-logs-collector.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-v2g62-logs-compliance.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-v2g62-logs-node-inventory.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/pod-config-controller-5f68659754-56qpc.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/pod-config-controller-5f68659754-56qpc-logs-manager.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/pod-scanner-7487f9cbb8-mchmc.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/pod-scanner-7487f9cbb8-mchmc-logs-scanner.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/pod-scanner-db-74f98cd84d-7sg42.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/pod-scanner-db-74f98cd84d-7sg42-logs-db.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/pod-sensor-7b4784c4d5-r7xsl.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/pod-sensor-7b4784c4d5-r7xsl-logs-sensor.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/pod-webhookserver-84f798856c-55slf.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/pod-webhookserver-84f798856c-55slf-logs-webhookserver.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/deployment-admission-control.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/deployment-central.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/deployment-central-db.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/deployment-config-controller.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/deployment-scanner.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/deployment-scanner-db.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/deployment-sensor.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/deployment-webhookserver.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/daemonset-collector.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/replicaset-admission-control-7c9bf84889.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/replicaset-central-795644c465.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/replicaset-central-db-84b98c8889.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/replicaset-config-controller-5f68659754.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/replicaset-scanner-7487f9cbb8.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/replicaset-scanner-db-74f98cd84d.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/replicaset-sensor-7b4784c4d5.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/replicaset-webhookserver-84f798856c.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/_ungrouped/configmap-admission-control.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-config.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-db-config.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-endpoints.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-external-db.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-injected-cabundle-stackrox-central-services.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-injected-cabundle-stackrox-secured-cluster-services.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/_ungrouped/configmap-kube-root-ca.crt.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/_ungrouped/configmap-openshift-service-ca.crt.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-scanner-config.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/configmap-sensor-past-instances.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-stackrox-central-helm.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-stackrox-secured-cluster-helm.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-tls-ca-bundle.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-admission-control.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-central.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-central-db.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-central-loadbalancer.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-scanner.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-scanner-db.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-sensor.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-sensor-webhook.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/service-webhookserver.yaml modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/event-list.csv modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/errors.txt modified at 2025-10-31T04:52:01Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file telemetry-data.json modified at 2025-10-31T04:52:17Z 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Ending testcase DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download succeeds with admin access token PASSED DiagnosticBundleTest STANDARD_OUT 04:52:17 | INFO | DiagnosticBundleTest | RoleService | Deleted role: No Access Test Role - 16043 and permission set 04:52:17 | INFO | DiagnosticBundleTest | RoleService | Deleted role: 05cccd42-d4b9-4aac-90b5-e55168f1cbb9 and permission set 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Ending testsuite 04:52:17 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Checking if cluster is healthy after test 04:52:17 | DEBUG | DiagnosticBundleTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries Enforcement STANDARD_OUT 04:52:17 | INFO | Enforcement | Enforcement | Starting testsuite 04:52:25 | INFO | Enforcement | Enforcement | Waiting for policies to propagate... 04:52:35 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:52:35 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace kill-enforcement-only 04:52:35 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:52:35 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace scale-down-enforcement-only 04:52:35 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:52:35 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace scale-down-enforcement-build-deploy-image 04:52:35 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:52:35 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace scale-down-enforcement-build-deploy-severity 04:52:35 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:52:35 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace node-constraint-enforcement 04:52:35 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:52:35 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace scale-down-and-node-constraint-deployment 04:52:35 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:52:35 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace alert-and-kill-enforcement-baseline-process 04:52:35 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:52:35 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace no-enforcement-on-update 04:52:35 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:52:35 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace no-enforcement-with-bypass-annotation 04:52:35 | DEBUG | Enforcement | Kubernetes | Waiting for kill-enforcement-only to start 04:52:35 | DEBUG | Enforcement | Kubernetes | Status of kill-enforcement-only's pods: 04:52:35 | DEBUG | Enforcement | Kubernetes | - kill-enforcement-only-b556bbbf4-zwphm Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:52:40 | DEBUG | Enforcement | Kubernetes | kill-enforcement-only: deployment created (skipped replica wait). 04:52:40 | DEBUG | Enforcement | Kubernetes | Updating deployment kill-enforcement-only with 1 pods 04:52:40 | DEBUG | Enforcement | Kubernetes | Waiting for scale-down-enforcement-only to start 04:52:40 | DEBUG | Enforcement | Kubernetes | Status of scale-down-enforcement-only's pods: 04:52:40 | DEBUG | Enforcement | Kubernetes | - scale-down-enforcement-only-5d7966f96-qkp7j Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:52:36Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:52:45 | DEBUG | Enforcement | Kubernetes | scale-down-enforcement-only: deployment created (skipped replica wait). 04:52:45 | DEBUG | Enforcement | Kubernetes | Updating deployment scale-down-enforcement-only with 1 pods 04:52:45 | DEBUG | Enforcement | Kubernetes | Waiting for scale-down-enforcement-build-deploy-image to start 04:52:45 | DEBUG | Enforcement | Kubernetes | Status of scale-down-enforcement-build-deploy-image's pods: 04:52:51 | DEBUG | Enforcement | Kubernetes | scale-down-enforcement-build-deploy-image: deployment created (skipped replica wait). 04:52:51 | DEBUG | Enforcement | Kubernetes | Updating deployment scale-down-enforcement-build-deploy-image with 0 pods 04:52:51 | DEBUG | Enforcement | Kubernetes | Waiting for scale-down-enforcement-build-deploy-severity to start 04:52:51 | DEBUG | Enforcement | Kubernetes | Status of scale-down-enforcement-build-deploy-severity's pods: 04:52:51 | DEBUG | Enforcement | Kubernetes | - scale-down-enforcement-build-deploy-severity-54467d587c-s4mc6 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:52:36Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:52:56 | DEBUG | Enforcement | Kubernetes | scale-down-enforcement-build-deploy-severity: deployment created (skipped replica wait). 04:52:56 | DEBUG | Enforcement | Kubernetes | Updating deployment scale-down-enforcement-build-deploy-severity with 1 pods 04:52:56 | DEBUG | Enforcement | Kubernetes | Waiting for node-constraint-enforcement to start 04:52:56 | DEBUG | Enforcement | Kubernetes | Status of node-constraint-enforcement's pods: 04:52:56 | DEBUG | Enforcement | Kubernetes | - node-constraint-enforcement-57c5d9c7db-vpbkl Container status: [] 04:52:56 | DEBUG | Enforcement | Kubernetes | - node-constraint-enforcement-c68dd794d-pnkdc Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:52:36Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:53:01 | DEBUG | Enforcement | Kubernetes | node-constraint-enforcement: deployment created (skipped replica wait). 04:53:01 | DEBUG | Enforcement | Kubernetes | Updating deployment node-constraint-enforcement with 2 pods 04:53:01 | DEBUG | Enforcement | Kubernetes | Waiting for scale-down-and-node-constraint-deployment to start 04:53:01 | DEBUG | Enforcement | Kubernetes | Status of scale-down-and-node-constraint-deployment's pods: 04:53:01 | DEBUG | Enforcement | Kubernetes | - scale-down-and-node-constraint-deployment-755d8fd7d5-vjzlr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:52:36Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:53:06 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-deployment: deployment created (skipped replica wait). 04:53:06 | DEBUG | Enforcement | Kubernetes | Updating deployment scale-down-and-node-constraint-deployment with 1 pods 04:53:06 | DEBUG | Enforcement | Kubernetes | Waiting for alert-and-kill-enforcement-baseline-process to start 04:53:06 | DEBUG | Enforcement | Kubernetes | Status of alert-and-kill-enforcement-baseline-process's pods: 04:53:06 | DEBUG | Enforcement | Kubernetes | - alert-and-kill-enforcement-baseline-process-6f9db6d8cc-f2mld Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:52:36Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:53:06 | DEBUG | Enforcement | Kubernetes | All 1 replicas found in ready state for alert-and-kill-enforcement-baseline-process 04:53:06 | DEBUG | Enforcement | Kubernetes | Took 0 seconds for k8s deployment alert-and-kill-enforcement-baseline-process 04:53:06 | DEBUG | Enforcement | Kubernetes | Updating deployment alert-and-kill-enforcement-baseline-process with 1 pods 04:53:06 | DEBUG | Enforcement | Kubernetes | Waiting for no-enforcement-on-update to start 04:53:06 | DEBUG | Enforcement | Kubernetes | Status of no-enforcement-on-update's pods: 04:53:06 | DEBUG | Enforcement | Kubernetes | - no-enforcement-on-update-656bc84d8f-hnf9b Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:52:36Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:53:11 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: deployment created (skipped replica wait). 04:53:11 | DEBUG | Enforcement | Kubernetes | Updating deployment no-enforcement-on-update with 1 pods 04:53:11 | DEBUG | Enforcement | Kubernetes | Waiting for no-enforcement-with-bypass-annotation to start 04:53:11 | DEBUG | Enforcement | Kubernetes | Status of no-enforcement-with-bypass-annotation's pods: 04:53:11 | DEBUG | Enforcement | Kubernetes | - no-enforcement-with-bypass-annotation-c95655c6f-fpkv8 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:52:36Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:53:11 | DEBUG | Enforcement | Kubernetes | All 1 replicas found in ready state for no-enforcement-with-bypass-annotation 04:53:11 | DEBUG | Enforcement | Kubernetes | Took 0 seconds for k8s deployment no-enforcement-with-bypass-annotation 04:53:11 | DEBUG | Enforcement | Kubernetes | Updating deployment no-enforcement-with-bypass-annotation with 1 pods 04:53:11 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:53:11 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to create scale-down-and-node-constraint-daemonset 04:53:11 | DEBUG | Enforcement | Kubernetes | Waiting for scale-down-and-node-constraint-daemonset to start 04:53:11 | DEBUG | Enforcement | Kubernetes | Status of scale-down-and-node-constraint-daemonset's pods: 04:53:16 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-daemonset: daemonset created (skipped replica wait). 04:53:16 | DEBUG | Enforcement | Kubernetes | Updating deployment scale-down-and-node-constraint-daemonset with 3 pods Enforcement > Test Kill Enforcement - Integration STANDARD_OUT 04:53:16 | INFO | Enforcement | Enforcement | Starting testcase: Test Kill Enforcement - Integration 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:16 | INFO | Enforcement | Services | violation size is: 1 04:53:16 | INFO | Enforcement | Services | kill-enforcement-only triggered after waiting 0 seconds 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:53:16 | INFO | Enforcement | Enforcement | checking if kill-enforcement-only-b556bbbf4-zwphm was killed 04:53:16 | DEBUG | Enforcement | Kubernetes | Could not query K8S for pod details, assuming pod was killed 04:53:16 | INFO | Enforcement | Enforcement | Enforcement took 0.021s 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:16 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Kill Enforcement - Integration PASSED Enforcement > Test Scale-down Enforcement - Integration STANDARD_OUT 04:53:16 | INFO | Enforcement | Enforcement | Starting testcase: Test Scale-down Enforcement - Integration 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:16 | INFO | Enforcement | Services | violation size is: 1 04:53:16 | INFO | Enforcement | Services | scale-down-enforcement-only triggered after waiting 0 seconds 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:53:16 | DEBUG | Enforcement | Kubernetes | scale-down-enforcement-only: Replicas=0 04:53:16 | INFO | Enforcement | Enforcement | Enforcement took 0s 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:16 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Scale-down Enforcement - Integration PASSED Enforcement > Test Scale-down Enforcement - Integration (build,deploy - image tag) STANDARD_OUT 04:53:16 | INFO | Enforcement | Enforcement | Starting testcase: Test Scale-down Enforcement - Integration (build,deploy - image tag) 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:16 | INFO | Enforcement | Services | violation size is: 1 04:53:16 | INFO | Enforcement | Services | scale-down-enforcement-build-deploy-image triggered after waiting 0 seconds 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:53:16 | DEBUG | Enforcement | Kubernetes | scale-down-enforcement-build-deploy-image: Replicas=0 04:53:16 | INFO | Enforcement | Enforcement | Enforcement took 0s 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:16 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Scale-down Enforcement - Integration (build,deploy - image tag) PASSED Enforcement > Test Scale-down Enforcement - Integration (build,deploy - SEVERITY) STANDARD_OUT 04:53:16 | INFO | Enforcement | Enforcement | Starting testcase: Test Scale-down Enforcement - Integration (build,deploy - SEVERITY) 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:16 | INFO | Enforcement | Services | violation size is: 1 04:53:16 | INFO | Enforcement | Services | scale-down-enforcement-build-deploy-severity triggered after waiting 0 seconds 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:53:16 | DEBUG | Enforcement | Kubernetes | scale-down-enforcement-build-deploy-severity: Replicas=0 04:53:16 | INFO | Enforcement | Enforcement | Enforcement took 0.001s 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:16 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Scale-down Enforcement - Integration (build,deploy - SEVERITY) PASSED Enforcement > Test Node Constraint Enforcement - Integration STANDARD_OUT 04:53:16 | INFO | Enforcement | Enforcement | Starting testcase: Test Node Constraint Enforcement - Integration 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:16 | INFO | Enforcement | Services | violation size is: 1 04:53:16 | INFO | Enforcement | Services | node-constraint-enforcement triggered after waiting 0 seconds 04:53:16 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:53:17 | DEBUG | Enforcement | Kubernetes | node-constraint-enforcement: Host=[BlockedByStackRox:4b322c5b-b532-43dc-aa01-71896b0aa53b] 04:53:18 | INFO | Enforcement | Enforcement | Enforcement took 1.018s 04:53:18 | DEBUG | Enforcement | Kubernetes | node-constraint-enforcement: Unavailable Replicas=1 04:53:18 | DEBUG | Enforcement | Kubernetes | node-constraint-enforcement: Replicas=1 04:53:18 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:18 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Node Constraint Enforcement - Integration PASSED Enforcement > Test Fail Build Enforcement - #policyName - Integration (build,deploy) > Test Fail Build Enforcement - fail-build-enforcement-only - Integration (build,deploy) STANDARD_OUT 04:53:18 | INFO | Enforcement | Enforcement | Starting testcase: Test Fail Build Enforcement - fail-build-enforcement-only - Integration (build,deploy) 04:53:18 | INFO | Enforcement | Services | Request scan of quay.io/rhacs-eng/qa:latest with sendNotifications=false 04:53:21 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Fail Build Enforcement - #policyName - Integration (build,deploy) > Test Fail Build Enforcement - fail-build-enforcement-only - Integration (build,deploy) PASSED Enforcement > Test Fail Build Enforcement - #policyName - Integration (build,deploy) > Test Fail Build Enforcement - fail-build-enforcement-with-scale-to-zero - Integration (build,deploy) STANDARD_OUT 04:53:21 | INFO | Enforcement | Enforcement | Starting testcase: Test Fail Build Enforcement - fail-build-enforcement-with-scale-to-zero - Integration (build,deploy) 04:53:21 | INFO | Enforcement | Services | Request scan of quay.io/rhacs-eng/qa:latest with sendNotifications=false 04:53:21 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Fail Build Enforcement - #policyName - Integration (build,deploy) > Test Fail Build Enforcement - fail-build-enforcement-with-scale-to-zero - Integration (build,deploy) PASSED Enforcement > Test Scale-down and Node Constraint Enforcement - Deployment STANDARD_OUT 04:53:21 | INFO | Enforcement | Enforcement | Starting testcase: Test Scale-down and Node Constraint Enforcement - Deployment 04:53:22 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:22 | INFO | Enforcement | Services | violation size is: 1 04:53:22 | INFO | Enforcement | Services | scale-down-and-node-constraint-deployment triggered after waiting 0 seconds 04:53:22 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:53:22 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-deployment: Replicas=0 04:53:22 | INFO | Enforcement | Enforcement | Enforcement took 0s 04:53:22 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-deployment: Host=[:] 04:53:22 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-deployment: Unavailable Replicas=null 04:53:22 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-deployment: Replicas=0 04:53:22 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:22 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Scale-down and Node Constraint Enforcement - Deployment PASSED Enforcement > Test Scale-down and Node Constraint Enforcement - DaemonSet STANDARD_OUT 04:53:22 | INFO | Enforcement | Enforcement | Starting testcase: Test Scale-down and Node Constraint Enforcement - DaemonSet 04:53:22 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:22 | INFO | Enforcement | Services | violation size is: 1 04:53:22 | INFO | Enforcement | Services | scale-down-and-node-constraint-daemonset triggered after waiting 0 seconds 04:53:22 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:53:22 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-daemonset: Host=[BlockedByStackRox:3b164956-8f27-4ae0-b97d-4a02289b009a] 04:53:23 | INFO | Enforcement | Enforcement | Enforcement took 1.019s 04:53:23 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-daemonset: Unavailable Replicas=null 04:53:23 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-daemonset: Replicas=0 04:53:23 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-daemonset: Replicas=0 04:53:23 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:23 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Scale-down and Node Constraint Enforcement - DaemonSet PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD]:30-Day Scan Age STANDARD_OUT 04:53:23 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [BUILD]:30-Day Scan Age 04:53:23 | INFO | Enforcement | Services | Updated lifecycleStage of '30-Day Scan Age' to [BUILD] 04:53:23 | INFO | Enforcement | Services | Updated lifecycleStage of '30-Day Scan Age' to [DEPLOY] 04:53:23 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD]:30-Day Scan Age PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [DEPLOY]:Latest tag STANDARD_OUT 04:53:23 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [DEPLOY]:Latest tag 04:53:23 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [DEPLOY] 04:53:23 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [BUILD, DEPLOY] 04:53:23 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [DEPLOY]:Latest tag PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, DEPLOY]:Latest tag STANDARD_OUT 04:53:23 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [BUILD, DEPLOY]:Latest tag 04:53:24 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [BUILD, DEPLOY] 04:53:24 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [BUILD, DEPLOY] 04:53:24 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, DEPLOY]:Latest tag PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [RUNTIME]:Ubuntu Package Manager Execution STANDARD_OUT 04:53:24 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [RUNTIME]:Ubuntu Package Manager Execution 04:53:24 | INFO | Enforcement | Services | Updated lifecycleStage of 'Ubuntu Package Manager Execution' to [RUNTIME] 04:53:24 | INFO | Enforcement | Services | Updated lifecycleStage of 'Ubuntu Package Manager Execution' to [RUNTIME] 04:53:24 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [RUNTIME]:Ubuntu Package Manager Execution PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [RUNTIME]:Latest tag STANDARD_OUT 04:53:24 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [RUNTIME]:Latest tag 04:53:24 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: A runtime policy must contain at least one policy criterion from process, network flow, audit log events, or Kubernetes events criteria categories, event source must be deployment or audit event for runtime policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:53:24 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [RUNTIME]:Latest tag PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, RUNTIME]:Latest tag STANDARD_OUT 04:53:24 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [BUILD, RUNTIME]:Latest tag 04:53:24 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: A runtime policy must contain at least one policy criterion from process, network flow, audit log events, or Kubernetes events criteria categories, event source must be deployment or audit event for runtime policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:53:24 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, RUNTIME]:Latest tag PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, RUNTIME]:Ubuntu Package Manager Execution STANDARD_OUT 04:53:24 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [BUILD, RUNTIME]:Ubuntu Package Manager Execution 04:53:24 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: policy configuration is invalid for build time: generating evaluator for policy section "": compiling field query: &{Process Name [r/apt-get|apt|dpkg] Or false false}: invalid query: field Process Name unknown, event source must not be set for build or deploy time policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:53:24 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, RUNTIME]:Ubuntu Package Manager Execution PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [DEPLOY, RUNTIME]:Latest tag STANDARD_OUT 04:53:24 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [DEPLOY, RUNTIME]:Latest tag 04:53:24 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: A runtime policy must contain at least one policy criterion from process, network flow, audit log events, or Kubernetes events criteria categories, event source must be deployment or audit event for runtime policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:53:24 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [DEPLOY, RUNTIME]:Latest tag PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [DEPLOY, RUNTIME]:Ubuntu Package Manager Execution STANDARD_OUT 04:53:24 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [DEPLOY, RUNTIME]:Ubuntu Package Manager Execution 04:53:25 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: deploy time policy cannot contain runtime criteria, event source must not be set for build or deploy time policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:53:25 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [DEPLOY, RUNTIME]:Ubuntu Package Manager Execution PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, DEPLOY, RUNTIME]:Latest tag STANDARD_OUT 04:53:25 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [BUILD, DEPLOY, RUNTIME]:Latest tag 04:53:25 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: A runtime policy must contain at least one policy criterion from process, network flow, audit log events, or Kubernetes events criteria categories, event source must be deployment or audit event for runtime policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:53:25 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, DEPLOY, RUNTIME]:Latest tag PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, DEPLOY, RUNTIME]:Ubuntu Package Manager Execution STANDARD_OUT 04:53:25 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [BUILD, DEPLOY, RUNTIME]:Ubuntu Package Manager Execution 04:53:25 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage errors: [policy configuration is invalid for build time: generating evaluator for policy section "": compiling field query: &{Process Name [r/apt-get|apt|dpkg] Or false false}: invalid query: field Process Name unknown, deploy time policy cannot contain runtime criteria], event source must not be set for build or deploy time policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:53:25 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, DEPLOY, RUNTIME]:Ubuntu Package Manager Execution PASSED Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [BUILD] STANDARD_OUT 04:53:25 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Enforcement/Lifecycle combinations: [BUILD] 04:53:25 | INFO | Enforcement | Services | Updated lifecycleStage of '30-Day Scan Age' to [BUILD] 04:53:25 | INFO | Enforcement | Services | Updated enforcement of '30-Day Scan Age' to [SCALE_TO_ZERO_ENFORCEMENT, UNSATISFIABLE_NODE_CONSTRAINT_ENFORCEMENT, KILL_POD_ENFORCEMENT, FAIL_BUILD_ENFORCEMENT, FAIL_KUBE_REQUEST_ENFORCEMENT, FAIL_DEPLOYMENT_CREATE_ENFORCEMENT, FAIL_DEPLOYMENT_UPDATE_ENFORCEMENT] 04:53:25 | INFO | Enforcement | Services | Updated lifecycleStage of '30-Day Scan Age' to [DEPLOY] 04:53:26 | INFO | Enforcement | Services | Updated enforcement of '30-Day Scan Age' to have no enforcement actions 04:53:26 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [BUILD] PASSED Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [DEPLOY] STANDARD_OUT 04:53:26 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Enforcement/Lifecycle combinations: [DEPLOY] 04:53:26 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [DEPLOY] 04:53:26 | INFO | Enforcement | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT, UNSATISFIABLE_NODE_CONSTRAINT_ENFORCEMENT, KILL_POD_ENFORCEMENT, FAIL_BUILD_ENFORCEMENT, FAIL_KUBE_REQUEST_ENFORCEMENT, FAIL_DEPLOYMENT_CREATE_ENFORCEMENT, FAIL_DEPLOYMENT_UPDATE_ENFORCEMENT] 04:53:26 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [BUILD, DEPLOY] 04:53:26 | INFO | Enforcement | Services | Updated enforcement of 'Latest tag' to have no enforcement actions 04:53:26 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [DEPLOY] PASSED Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [BUILD, DEPLOY] STANDARD_OUT 04:53:26 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Enforcement/Lifecycle combinations: [BUILD, DEPLOY] 04:53:26 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [BUILD, DEPLOY] 04:53:27 | INFO | Enforcement | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT, UNSATISFIABLE_NODE_CONSTRAINT_ENFORCEMENT, KILL_POD_ENFORCEMENT, FAIL_BUILD_ENFORCEMENT, FAIL_KUBE_REQUEST_ENFORCEMENT, FAIL_DEPLOYMENT_CREATE_ENFORCEMENT, FAIL_DEPLOYMENT_UPDATE_ENFORCEMENT] 04:53:27 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [BUILD, DEPLOY] 04:53:27 | INFO | Enforcement | Services | Updated enforcement of 'Latest tag' to have no enforcement actions 04:53:27 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [BUILD, DEPLOY] PASSED Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [RUNTIME] STANDARD_OUT 04:53:27 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Enforcement/Lifecycle combinations: [RUNTIME] 04:53:27 | INFO | Enforcement | Services | Updated lifecycleStage of 'Ubuntu Package Manager Execution' to [RUNTIME] 04:53:27 | INFO | Enforcement | Services | Updated enforcement of 'Ubuntu Package Manager Execution' to [SCALE_TO_ZERO_ENFORCEMENT, UNSATISFIABLE_NODE_CONSTRAINT_ENFORCEMENT, KILL_POD_ENFORCEMENT, FAIL_BUILD_ENFORCEMENT, FAIL_KUBE_REQUEST_ENFORCEMENT, FAIL_DEPLOYMENT_CREATE_ENFORCEMENT, FAIL_DEPLOYMENT_UPDATE_ENFORCEMENT] 04:53:28 | INFO | Enforcement | Services | Updated lifecycleStage of 'Ubuntu Package Manager Execution' to [RUNTIME] 04:53:28 | INFO | Enforcement | Services | Updated enforcement of 'Ubuntu Package Manager Execution' to have no enforcement actions 04:53:28 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [RUNTIME] PASSED Enforcement > Test Alert and Kill Pod Enforcement - Baseline Process STANDARD_OUT 04:53:28 | INFO | Enforcement | Enforcement | Starting testcase: Test Alert and Kill Pod Enforcement - Baseline Process 04:53:28 | INFO | Enforcement | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa, 0ab100e5-32ba-40f9-84a0-fe9622b37235, null within 0s 04:53:28 | INFO | Enforcement | Enforcement | id: "DC:c82067c8-51ad-4080-b8e4-2ab4baabf49e:qa:0ab100e5-32ba-40f9-84a0-fe9622b37235:alert-and-kill-enforcement-baseline-process" key { deployment_id: "0ab100e5-32ba-40f9-84a0-fe9622b37235" container_name: "alert-and-kill-enforcement-baseline-process" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1761886408 nanos: 387555808 } stack_rox_locked_timestamp { seconds: 1761886468 nanos: 387556018 } last_update { seconds: 1761886408 nanos: 387555808 } 04:53:38 | DEBUG | Enforcement | Kubernetes | First container in pod alert-and-kill-enforcement-baseline-process-6f9db6d8cc-f2mld is running 04:53:38 | DEBUG | Enforcement | Kubernetes | Exec-ing the following command in pod alert-and-kill-enforcement-baseline-process-6f9db6d8cc-f2mld: [pwd] 04:53:38 | DEBUG | | Kubernetes | Command exited with 0 04:53:38 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:53:38 | DEBUG | Enforcement | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:53:38 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:38 | INFO | Enforcement | Services | violation size is: 1 04:53:38 | INFO | Enforcement | Services | alert-and-kill-enforcement-baseline-process triggered after waiting 0 seconds 04:53:38 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:38 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:53:38 | INFO | Enforcement | Enforcement | checking if alert-and-kill-enforcement-baseline-process-6f9db6d8cc-f2mld was killed 04:53:38 | DEBUG | Enforcement | Kubernetes | Could not query K8S for pod details, assuming pod was killed 04:53:38 | INFO | Enforcement | Enforcement | Enforcement took 0.02s 04:53:38 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:38 | DEBUG | Enforcement | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:53:38 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Alert and Kill Pod Enforcement - Baseline Process PASSED Enforcement > Test Enforcement not done on updated - Integration STANDARD_OUT 04:53:38 | INFO | Enforcement | Enforcement | Starting testcase: Test Enforcement not done on updated - Integration 04:53:38 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:38 | INFO | Enforcement | Services | violation size is: 1 04:53:38 | INFO | Enforcement | Services | no-enforcement-on-update triggered after waiting 0 seconds 04:53:38 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=1 04:53:38 | INFO | Enforcement | Services | Updated enforcement of 'no-enforcement-on-update' to [SCALE_TO_ZERO_ENFORCEMENT] 04:53:39 | DEBUG | Enforcement | Kubernetes | Deployment no-enforcement-on-update found in namespace qa. Updating... 04:53:39 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:53:39 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace no-enforcement-on-update 04:53:39 | DEBUG | Enforcement | Kubernetes | Waiting for no-enforcement-on-update to start 04:53:39 | DEBUG | Enforcement | Kubernetes | Status of no-enforcement-on-update's pods: 04:53:39 | DEBUG | Enforcement | Kubernetes | - no-enforcement-on-update-656bc84d8f-hnf9b Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:52:36Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:53:39 | DEBUG | Enforcement | Kubernetes | - no-enforcement-on-update-656bc84d8f-qnkg2 Container status: [] 04:53:44 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: deployment created (skipped replica wait). 04:53:44 | DEBUG | Enforcement | Kubernetes | Updating deployment no-enforcement-on-update with 2 pods 04:53:44 | INFO | Enforcement | Enforcement | Verifying that enforcement action was not taken 04:53:44 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:53:45 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:53:46 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:53:47 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:53:48 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:53:49 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:53:50 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:53:51 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:53:52 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:53:53 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:53:54 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:53:54 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Enforcement not done on updated - Integration PASSED Enforcement > Test Scale-down Enforcement Ignored due to Bypass Annotation - Integration STANDARD_OUT 04:53:54 | INFO | Enforcement | Enforcement | Starting testcase: Test Scale-down Enforcement Ignored due to Bypass Annotation - Integration 04:53:54 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:54 | INFO | Enforcement | Services | violation size is: 1 04:53:54 | INFO | Enforcement | Services | no-enforcement-with-bypass-annotation triggered after waiting 0 seconds 04:53:54 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:53:54 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:53:55 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:53:56 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:53:57 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:53:58 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:53:59 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:54:00 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:54:01 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:54:02 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:54:03 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:54:04 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:54:05 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:54:06 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:54:07 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:54:08 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:54:09 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:54:09 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Scale-down Enforcement Ignored due to Bypass Annotation - Integration PASSED Enforcement STANDARD_OUT 04:54:10 | DEBUG | Enforcement | Kubernetes | Removed the deployment: kill-enforcement-only 04:54:10 | DEBUG | Enforcement | Kubernetes | Removed the deployment: scale-down-enforcement-only 04:54:10 | DEBUG | Enforcement | Kubernetes | Removed the deployment: scale-down-enforcement-build-deploy-image 04:54:10 | DEBUG | Enforcement | Kubernetes | Removed the deployment: scale-down-enforcement-build-deploy-severity 04:54:10 | DEBUG | Enforcement | Kubernetes | Removed the deployment: node-constraint-enforcement 04:54:10 | DEBUG | Enforcement | Kubernetes | Removed the deployment: scale-down-and-node-constraint-deployment 04:54:10 | DEBUG | Enforcement | Kubernetes | Removed the deployment: alert-and-kill-enforcement-baseline-process 04:54:10 | DEBUG | Enforcement | Kubernetes | Removed the deployment: no-enforcement-on-update 04:54:10 | DEBUG | Enforcement | Kubernetes | Removed the deployment: no-enforcement-with-bypass-annotation 04:54:10 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-daemonset: daemonset removed. 04:54:10 | INFO | Enforcement | Enforcement | Ending testsuite 04:54:10 | INFO | Enforcement | Enforcement | Checking if cluster is healthy after test 04:54:10 | DEBUG | Enforcement | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ExternalNetworkSourcesTest STANDARD_OUT 04:54:10 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Starting testsuite ExternalNetworkSourcesTest > Verify connection to a user created external sources STANDARD_OUT 04:54:10 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Starting testcase: Verify connection to a user created external sources 04:54:10 | DEBUG | ExternalNetworkSourcesTes | OpenShift | Namespace qa already exists 04:54:10 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Told the orchestrator to createOrReplace external-connection 04:54:10 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 04:54:10 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 04:54:10 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-mfh8s Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:54:10 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | 0/1 are in the ready state for external-connection 04:54:13 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 04:54:13 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 04:54:13 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-mfh8s Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:54:11Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:54:13 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | All 1 replicas found in ready state for external-connection 04:54:13 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Took 3 seconds for k8s deployment external-connection 04:54:13 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Updating deployment external-connection with 1 pods 04:54:14 | INFO | ExternalNetworkSourcesTes | Services | SR found deployment external-connection within 0s 04:54:14 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Create a external source containing Cloudflare's IP address 04:54:14 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 04:54:14 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 04:54:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:23 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:23 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:27 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:27 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:28 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:28 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:41 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:41 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:42 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:42 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:43 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:43 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId adee5287-0d93-4c72-be07-3d00366c9551, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 04:54:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id adee5287-0d93-4c72-be07-3d00366c9551 -> edge target key: 146 04:54:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ 04:54:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1761886485.908496985 04:54:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1761886485.908546807 04:54:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761886485.908569297 04:54:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source adee5287-0d93-4c72-be07-3d00366c9551 -> target c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOQ in graph after 31.588s 04:54:45 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Removed the deployment: external-connection 04:54:45 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Ending testcase ExternalNetworkSourcesTest > Verify connection to a user created external sources PASSED ExternalNetworkSourcesTest > Verify flow stays to the smallest subnet possible STANDARD_OUT 04:54:45 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Starting testcase: Verify flow stays to the smallest subnet possible 04:54:46 | DEBUG | ExternalNetworkSourcesTes | OpenShift | Namespace qa already exists 04:54:46 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Told the orchestrator to createOrReplace external-connection 04:54:46 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 04:54:46 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 04:54:46 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-flw5v Container status: [] 04:54:46 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-mfh8s Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:54:11Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:54:46 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | 0/1 are in the ready state for external-connection 04:54:49 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 04:54:49 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 04:54:49 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-flw5v Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:54:46Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:54:49 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-mfh8s Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:54:11Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:54:49 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | All 1 replicas found in ready state for external-connection 04:54:49 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Took 3 seconds for k8s deployment external-connection 04:54:49 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Updating deployment external-connection with 2 pods 04:54:49 | INFO | ExternalNetworkSourcesTes | Services | SR found deployment external-connection within 0s 04:54:49 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Create a smaller network external source containing Cloudflare's IP address 04:54:49 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 04:54:49 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 04:54:49 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Edge from deployment to external source external-source-subnet--667 should exist 04:54:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:53 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:53 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:58 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:58 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:54:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:03 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:03 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:08 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:08 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:09 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:09 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 04:55:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id 7ea0d251-b494-4e9b-bfca-8a45297264b4 -> edge target key: 146 04:55:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1761886515.626081878 04:55:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761886515.626113019 04:55:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source 7ea0d251-b494-4e9b-bfca-8a45297264b4 -> target c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA in graph after 26.245s 04:55:15 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Create a supernet external source containing Cloudflare's IP address 04:55:15 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 04:55:15 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 04:55:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:23 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:23 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xNw 04:55:26 | WARN | ExternalNetworkSourcesTes | NetworkGraphUtil | SR did not detect the edge in Network Flow graph 04:55:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 7ea0d251-b494-4e9b-bfca-8a45297264b4, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 04:55:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id 7ea0d251-b494-4e9b-bfca-8a45297264b4 -> edge target key: 146 04:55:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA 04:55:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761886526.393382868 04:55:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1761886526.393406009 04:55:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source 7ea0d251-b494-4e9b-bfca-8a45297264b4 -> target c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yOA in graph after 0.051s 04:55:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Removed the deployment: external-connection 04:55:26 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Ending testcase ExternalNetworkSourcesTest > Verify flow stays to the smallest subnet possible PASSED ExternalNetworkSourcesTest > Verify flow re-maps to larger subnet when smaller subnet deleted STANDARD_OUT 04:55:26 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Starting testcase: Verify flow re-maps to larger subnet when smaller subnet deleted 04:55:26 | DEBUG | ExternalNetworkSourcesTes | OpenShift | Namespace qa already exists 04:55:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Told the orchestrator to createOrReplace external-connection 04:55:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 04:55:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 04:55:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-flw5v Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:54:46Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:55:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-xfwfj Container status: [] 04:55:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | 0/1 are in the ready state for external-connection 04:55:29 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 04:55:29 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 04:55:29 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-flw5v Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:54:46Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:55:29 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-xfwfj Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:55:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:55:29 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | All 1 replicas found in ready state for external-connection 04:55:29 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Took 3 seconds for k8s deployment external-connection 04:55:29 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Updating deployment external-connection with 2 pods 04:55:29 | INFO | ExternalNetworkSourcesTes | Services | SR found deployment external-connection within 0s 04:55:29 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Get ID of deployment which is communicating the external source 04:55:29 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Create a smaller subnet network entities with Cloudflare's IP address 04:55:29 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 04:55:29 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 04:55:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:41 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:41 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:42 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:42 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:43 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:43 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:47 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:47 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:48 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:48 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:58 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:58 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:55:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:01 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:01 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:03 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:03 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:08 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:08 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:09 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:09 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 04:56:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id ade99ef3-7d65-453a-ae36-7509767521f1 -> edge target key: 144 04:56:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw 04:56:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1761886576.13283539 04:56:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1761886576.13378642 04:56:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761886576.13427103 04:56:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source ade99ef3-7d65-453a-ae36-7509767521f1 -> target c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNw in graph after 46.144s 04:56:16 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Add supernet and remove subnet 04:56:16 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 04:56:16 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 04:56:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:23 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:23 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:26 | WARN | ExternalNetworkSourcesTes | NetworkGraphUtil | SR did not detect the edge in Network Flow graph 04:56:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId ade99ef3-7d65-453a-ae36-7509767521f1, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 04:56:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id ade99ef3-7d65-453a-ae36-7509767521f1 -> edge target key: 146 04:56:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA 04:56:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1761886586.794482094 04:56:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1761886586.794658269 04:56:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761886586.794690089 04:56:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source ade99ef3-7d65-453a-ae36-7509767521f1 -> target c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOA in graph after 0.054s 04:56:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Removed the deployment: external-connection 04:56:26 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Ending testcase ExternalNetworkSourcesTest > Verify flow re-maps to larger subnet when smaller subnet deleted PASSED ExternalNetworkSourcesTest > Verify two flows co-exist if larger network entity added first STANDARD_OUT 04:56:26 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Starting testcase: Verify two flows co-exist if larger network entity added first 04:56:26 | DEBUG | ExternalNetworkSourcesTes | OpenShift | Namespace qa already exists 04:56:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Told the orchestrator to createOrReplace external-connection 04:56:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 04:56:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 04:56:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-xfwfj Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:55:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:56:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | 0/1 are in the ready state for external-connection 04:56:29 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 04:56:30 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 04:56:30 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-kv274 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:56:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:56:30 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-xfwfj Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:55:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:56:30 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | All 1 replicas found in ready state for external-connection 04:56:30 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Took 3 seconds for k8s deployment external-connection 04:56:30 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Updating deployment external-connection with 2 pods 04:56:30 | INFO | ExternalNetworkSourcesTes | Services | SR found deployment external-connection within 0s 04:56:30 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 04:56:30 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 04:56:30 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Verify edge exists from deployment to supernet external source 04:56:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:41 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:41 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:42 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:42 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:43 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:43 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:47 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:47 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:48 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:48 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:53 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:53 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:58 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:58 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:56:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:01 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:01 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:03 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:03 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:09 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:09 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 04:57:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id 0ec29eae-7e6d-4256-9676-3969c2c75435 -> edge target key: 145 04:57:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1761886635.288344320 04:57:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1761886635.288423642 04:57:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761886635.288475913 04:57:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source 0ec29eae-7e6d-4256-9676-3969c2c75435 -> target c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ in graph after 45.061s 04:57:15 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Add smaller subnet subnet external source 04:57:15 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 04:57:15 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 04:57:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:23 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:23 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:27 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:27 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:28 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:28 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:41 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:41 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:42 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:42 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:43 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:43 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id 0ec29eae-7e6d-4256-9676-3969c2c75435 -> edge target key: 147 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1761886665.901004502 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1761886665.901100095 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761886665.901116045 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source 0ec29eae-7e6d-4256-9676-3969c2c75435 -> target c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjEuMC8yNg in graph after 30.415s 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id 0ec29eae-7e6d-4256-9676-3969c2c75435 -> edge target key: 145 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761886613.103924000 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1761886613.189653000 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1761886606.829799000 04:57:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source 0ec29eae-7e6d-4256-9676-3969c2c75435 -> target c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ in graph after 0.046s 04:57:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 04:57:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id 0ec29eae-7e6d-4256-9676-3969c2c75435 -> edge target key: 146 04:57:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:57:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1761886606.829799000 04:57:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761886613.103924000 04:57:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1761886613.189653000 04:57:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source 0ec29eae-7e6d-4256-9676-3969c2c75435 -> target c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ in graph after 0.045s 04:57:46 | DEBUG | ExternalNetworkSourcesTes | Helpers | Caught exception. Retrying in 30s (attempt 0 of 20): Condition not satisfied: !NetworkGraphUtil.checkForEdge( entityID1, entityID2, since(sinceSeconds), 10) || | | | | | || | | | | 60 || | | | seconds: 1761886605 || | | c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ || | 0ec29eae-7e6d-4256-9676-3969c2c75435 || [objects.Edge@69626e2c, objects.Edge@7252aac, objects.Edge@293a1d1b] |class util.NetworkGraphUtil false 04:58:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:23 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:23 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 0ec29eae-7e6d-4256-9676-3969c2c75435, targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId c82067c8-51ad-4080-b8e4-2ab4baabf49e__MS4xLjAuMC8xOQ 04:58:26 | WARN | ExternalNetworkSourcesTes | NetworkGraphUtil | SR did not detect the edge in Network Flow graph 04:58:26 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Removed the deployment: external-connection 04:58:26 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Ending testcase ExternalNetworkSourcesTest > Verify two flows co-exist if larger network entity added first PASSED ExternalNetworkSourcesTest STANDARD_OUT 04:58:26 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Ending testsuite 04:58:26 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Checking if cluster is healthy after test 04:58:26 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries GlobalSearch STANDARD_OUT 04:58:26 | INFO | GlobalSearch | GlobalSearch | Starting testsuite 04:58:26 | DEBUG | GlobalSearch | OpenShift | Namespace qa already exists 04:58:26 | DEBUG | GlobalSearch | Kubernetes | Told the orchestrator to createOrReplace qaglobalsearch 04:58:26 | DEBUG | GlobalSearch | Kubernetes | Waiting for qaglobalsearch to start 04:58:26 | DEBUG | GlobalSearch | Kubernetes | Status of qaglobalsearch's pods: 04:58:26 | DEBUG | GlobalSearch | Kubernetes | 0/1 are in the ready state for qaglobalsearch 04:58:29 | DEBUG | GlobalSearch | Kubernetes | Waiting for qaglobalsearch to start 04:58:29 | DEBUG | GlobalSearch | Kubernetes | Status of qaglobalsearch's pods: 04:58:29 | DEBUG | GlobalSearch | Kubernetes | - qaglobalsearch-55ff8d7cd6-w2r2g Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T04:58:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:58:29 | DEBUG | GlobalSearch | Kubernetes | All 1 replicas found in ready state for qaglobalsearch 04:58:29 | DEBUG | GlobalSearch | Kubernetes | Took 3 seconds for k8s deployment qaglobalsearch 04:58:29 | DEBUG | GlobalSearch | Kubernetes | Updating deployment qaglobalsearch with 1 pods 04:58:29 | INFO | GlobalSearch | Services | SR found deployment qaglobalsearch within 0s 04:58:29 | DEBUG | GlobalSearch | Helpers | Calling services.AlertService.getViolations with 3 retries 04:58:29 | INFO | GlobalSearch | Services | violation size is: 1 04:58:29 | INFO | GlobalSearch | Services | Latest tag triggered after waiting 0 seconds GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Deployment:qaglobalsearch, [DEPLOYMENTS]) STANDARD_OUT 04:58:29 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Deployment:qaglobalsearch, [DEPLOYMENTS]) 04:58:29 | INFO | GlobalSearch | GlobalSearch | Category: DEPLOYMENTS: 1 04:58:29 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Deployment:qaglobalsearch, [DEPLOYMENTS]) PASSED GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Image:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, [IMAGES]) STANDARD_OUT 04:58:29 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Image:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, [IMAGES]) 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: IMAGES: 2 04:58:30 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Image:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, [IMAGES]) PASSED GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Violation State:ACTIVE+Policy:Latest, [ALERTS]) STANDARD_OUT 04:58:30 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Violation State:ACTIVE+Policy:Latest, [ALERTS]) 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: ALERTS: 2 04:58:30 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Violation State:ACTIVE+Policy:Latest, [ALERTS]) PASSED GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Deployment:qaglobalsearch, [DEPLOYMENTS, ALERTS]) STANDARD_OUT 04:58:30 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Deployment:qaglobalsearch, [DEPLOYMENTS, ALERTS]) 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: DEPLOYMENTS: 1 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: ALERTS: 7 04:58:30 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Deployment:qaglobalsearch, [DEPLOYMENTS, ALERTS]) PASSED GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Deployment:qaglobalsearch, []) STANDARD_OUT 04:58:30 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Deployment:qaglobalsearch, []) 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: ALERTS: 7 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: IMAGES: 1 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: POLICIES: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: DEPLOYMENTS: 1 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: SECRETS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: CLUSTERS: 1 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: NAMESPACES: 1 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: NODES: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: SERVICE_ACCOUNTS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: ROLES: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: ROLEBINDINGS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: SUBJECTS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: POLICY_CATEGORIES: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: IMAGE_INTEGRATIONS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Deployment:qaglobalsearch, []) PASSED GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Image:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, []) STANDARD_OUT 04:58:30 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Image:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, []) 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: ALERTS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: IMAGES: 2 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: POLICIES: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: DEPLOYMENTS: 1 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: SECRETS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: CLUSTERS: 1 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: NAMESPACES: 1 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: NODES: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: SERVICE_ACCOUNTS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: ROLES: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: ROLEBINDINGS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: SUBJECTS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: POLICY_CATEGORIES: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: IMAGE_INTEGRATIONS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Image:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, []) PASSED GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Subject:system:auth, [SUBJECTS]) STANDARD_OUT 04:58:30 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Subject:system:auth, [SUBJECTS]) 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: SUBJECTS: 2 04:58:30 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Subject:system:auth, [SUBJECTS]) PASSED GlobalSearch > Verify Global search on policies (#query, #searchCategories) > Verify Global search on policies (Policy:Latest tag, [POLICIES]) STANDARD_OUT 04:58:30 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search on policies (Policy:Latest tag, [POLICIES]) 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: POLICIES: 1 04:58:30 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search on policies (#query, #searchCategories) > Verify Global search on policies (Policy:Latest tag, [POLICIES]) PASSED GlobalSearch > Verify Global search on policies (#query, #searchCategories) > Verify Global search on policies (Policy:Latest tag, []) STANDARD_OUT 04:58:30 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search on policies (Policy:Latest tag, []) 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: ALERTS: 7 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: IMAGES: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: POLICIES: 1 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: DEPLOYMENTS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: SECRETS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: CLUSTERS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: NAMESPACES: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: NODES: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: SERVICE_ACCOUNTS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: ROLES: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: ROLEBINDINGS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: SUBJECTS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: POLICY_CATEGORIES: 2 04:58:30 | INFO | GlobalSearch | GlobalSearch | Category: IMAGE_INTEGRATIONS: 0 04:58:30 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search on policies (#query, #searchCategories) > Verify Global search on policies (Policy:Latest tag, []) PASSED GlobalSearch STANDARD_OUT 04:58:30 | DEBUG | GlobalSearch | Kubernetes | Removed the deployment: qaglobalsearch 04:58:30 | INFO | GlobalSearch | GlobalSearch | Ending testsuite 04:58:30 | INFO | GlobalSearch | GlobalSearch | Checking if cluster is healthy after test 04:58:30 | DEBUG | GlobalSearch | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries GraphQLResourcePaginationTest STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testsuite GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination deployment Namespace:stackrox+Deployment:c Sort(Deployment) images STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination deployment Namespace:stackrox+Deployment:c Sort(Deployment) images 04:58:30 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination deployment Namespace:stackrox+Deployment:c Sort(Deployment) images SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination deployment Namespace:stackrox+Deployment:central Sort(Deployment) secrets STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination deployment Namespace:stackrox+Deployment:central Sort(Deployment) secrets 04:58:30 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination deployment Namespace:stackrox+Deployment:central Sort(Deployment) secrets SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination cluster Sort(null) subjects STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination cluster Sort(null) subjects 04:58:30 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination cluster Sort(null) subjects SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination cluster Sort(null) serviceAccounts STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination cluster Sort(null) serviceAccounts 04:58:30 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination cluster Sort(null) serviceAccounts SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination cluster Sort(null) k8sRoles STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination cluster Sort(null) k8sRoles 04:58:30 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination cluster Sort(null) k8sRoles SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination node Sort(null) STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination node Sort(null) 04:58:30 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination node Sort(null) SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination secret Secret:scanner-db-password Sort(null) deployments STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination secret Secret:scanner-db-password Sort(null) deployments 04:58:30 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination secret Secret:scanner-db-password Sort(null) deployments SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination subject Subject:kubelet Sort(null) k8sRoles STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination subject Subject:kubelet Sort(null) k8sRoles 04:58:30 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination subject Subject:kubelet Sort(null) k8sRoles SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination k8sRole Role:system:node-bootstrapper Sort(null) subjects STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination k8sRole Role:system:node-bootstrapper Sort(null) subjects 04:58:30 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination k8sRole Role:system:node-bootstrapper Sort(null) subjects SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination k8sRole Namespace:stackrox+Role:edit Sort(null) serviceAccounts STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination k8sRole Namespace:stackrox+Role:edit Sort(null) serviceAccounts 04:58:30 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination k8sRole Namespace:stackrox+Role:edit Sort(null) serviceAccounts SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination serviceAccount Service Account:"central" Sort(null) k8sRoles STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination serviceAccount Service Account:"central" Sort(null) k8sRoles 04:58:30 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination serviceAccount Service Account:"central" Sort(null) k8sRoles SKIPPED GraphQLResourcePaginationTest > Verify graphql pagination and sublist pagination for namespaces #topLevelQuery #subResource > Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox secrets STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox secrets 04:58:30 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql pagination and sublist pagination for namespaces #topLevelQuery #subResource > Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox secrets SKIPPED GraphQLResourcePaginationTest > Verify graphql pagination and sublist pagination for namespaces #topLevelQuery #subResource > Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox serviceAccounts STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox serviceAccounts 04:58:30 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql pagination and sublist pagination for namespaces #topLevelQuery #subResource > Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox serviceAccounts SKIPPED GraphQLResourcePaginationTest > Verify graphql pagination and sublist pagination for namespaces #topLevelQuery #subResource > Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox k8sRoles STANDARD_OUT 04:58:30 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox k8sRoles 04:58:31 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:58:31 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql pagination and sublist pagination for namespaces #topLevelQuery #subResource > Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox k8sRoles SKIPPED GraphQLResourcePaginationTest STANDARD_OUT 04:58:31 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testsuite 04:58:31 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Checking if cluster is healthy after test 04:58:31 | DEBUG | GraphQLResourcePagination | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries GroupsTest STANDARD_OUT 04:58:31 | INFO | GroupsTest | GroupsTest | Starting testsuite 04:58:31 | INFO | GroupsTest | RoleService | Created role: QAGroupTest-Group1 04:58:31 | INFO | GroupsTest | RoleService | Created role: QAGroupTest-Group2 04:58:31 | INFO | GroupsTest | RoleService | Created role: QAGroupTest-Group3 04:58:31 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.createGroup with 3 retries 04:58:31 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:58:31 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.createGroup with 3 retries 04:58:31 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:58:31 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.createGroup with 3 retries 04:58:31 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries GroupsTest > Test that creating group with invalid role name returns an error STANDARD_OUT 04:58:31 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that creating group with invalid role name returns an error 04:58:31 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that creating group with invalid role name returns an error PASSED GroupsTest > Test that creating group with invalid auth provider id returns an error STANDARD_OUT 04:58:31 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that creating group with invalid auth provider id returns an error 04:58:31 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that creating group with invalid auth provider id returns an error PASSED GroupsTest > Test that updating group with invalid role name returns an error STANDARD_OUT 04:58:31 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that updating group with invalid role name returns an error 04:58:31 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that updating group with invalid role name returns an error PASSED GroupsTest > Test that updating group with invalid auth provider id returns an error STANDARD_OUT 04:58:31 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that updating group with invalid auth provider id returns an error 04:58:31 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that updating group with invalid auth provider id returns an error PASSED GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-1, null, null) STANDARD_OUT 04:58:31 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-1, null, null) 04:58:31 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroup with 3 retries 04:58:31 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:58:31 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-1, null, null) PASSED GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (null, foo, bar) STANDARD_OUT 04:58:31 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that GetGroup and GetGroups work correctly with query args (null, foo, bar) 04:58:31 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroup with 3 retries 04:58:31 | DEBUG | GroupsTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: invalid arguments: authprovider ID must be set in {id: "some-id" key: "foo" value: "bar" } 04:58:32 | DEBUG | GroupsTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: invalid arguments: authprovider ID must be set in {id: "some-id" key: "foo" value: "bar" } 04:58:33 | DEBUG | GroupsTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: invalid arguments: authprovider ID must be set in {id: "some-id" key: "foo" value: "bar" } 04:58:34 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:58:34 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (null, foo, bar) PASSED GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-1, foo, bar) STANDARD_OUT 04:58:34 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-1, foo, bar) 04:58:34 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroup with 3 retries 04:58:34 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:58:34 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-1, foo, bar) PASSED GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-2, null, null) STANDARD_OUT 04:58:34 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-2, null, null) 04:58:34 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroup with 3 retries 04:58:34 | DEBUG | GroupsTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: NOT_FOUND: could not find group some-id 04:58:35 | DEBUG | GroupsTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: NOT_FOUND: could not find group some-id 04:58:36 | DEBUG | GroupsTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: NOT_FOUND: could not find group some-id 04:58:37 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:58:37 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-2, null, null) PASSED GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-2, foo, bar) STANDARD_OUT 04:58:37 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-2, foo, bar) 04:58:37 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroup with 3 retries 04:58:37 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:58:37 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-2, foo, bar) PASSED GroupsTest STANDARD_OUT 04:58:37 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.deleteGroup with 3 retries 04:58:37 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.deleteGroup with 3 retries 04:58:37 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.deleteGroup with 3 retries 04:58:37 | INFO | GroupsTest | RoleService | Deleted role: QAGroupTest-Group1 04:58:37 | INFO | GroupsTest | RoleService | Deleted role: QAGroupTest-Group2 04:58:37 | INFO | GroupsTest | RoleService | Deleted role: QAGroupTest-Group3 04:58:37 | INFO | GroupsTest | GroupsTest | Ending testsuite 04:58:37 | INFO | GroupsTest | GroupsTest | Checking if cluster is healthy after test 04:58:37 | DEBUG | GroupsTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries HelpersTest > Verify Helpers.compareAnnotations() same > Verify Helpers.compareAnnotations() same [orchestratorAnnotations: [same:value], stackroxAnnotations: [same:value], #0] PASSED HelpersTest > Verify Helpers.compareAnnotations() same > Verify Helpers.compareAnnotations() same [orchestratorAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789], stackroxAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789], #1] PASSED HelpersTest > Verify Helpers.compareAnnotations() same > Verify Helpers.compareAnnotations() same [orchestratorAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789], stackroxAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123...], #2] STANDARD_OUT 04:58:38 | INFO | | Helpers | Removing long annotation value from comparison: key: same, length: 500 HelpersTest > Verify Helpers.compareAnnotations() same > Verify Helpers.compareAnnotations() same [orchestratorAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789], stackroxAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123...], #2] PASSED HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:value], stackroxAnnotations: [different key:value], #0] STANDARD_OUT 04:58:38 | INFO | | Helpers | There is an annotation difference HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:value], stackroxAnnotations: [different key:value], #0] PASSED HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [some:value], stackroxAnnotations: [same:different value], #1] STANDARD_OUT 04:58:38 | INFO | | Helpers | There is an annotation difference HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [some:value], stackroxAnnotations: [same:different value], #1] PASSED HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:value], stackroxAnnotations: [same:value, extra:extra], #2] STANDARD_OUT 04:58:38 | INFO | | Helpers | There is an annotation difference HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:value], stackroxAnnotations: [same:value, extra:extra], #2] PASSED HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:value, extra:extra], stackroxAnnotations: [same:value], #3] STANDARD_OUT 04:58:38 | INFO | | Helpers | There is an annotation difference HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:value, extra:extra], stackroxAnnotations: [same:value], #3] PASSED HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789], stackroxAnnotations: [missing:value], #4] PASSED HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123], stackroxAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456...], #5] STANDARD_OUT 04:58:38 | INFO | | Helpers | There is an annotation difference HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123], stackroxAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456...], #5] PASSED Gradle Test Executor 5 STANDARD_OUT 04:58:38 | WARN | | Deployment | WARNING: XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets may be subject to rate limiting. Consider making a duplicate at quay.io/rhacs-eng/qa:XXXXXXXXXXXX-dkr-ecr-XXXXXXXXX-amazonaws-com-stackrox-qa-ecr-test-registry-image-no-secrets e.g. (needs write access - ask @eng-staff) docker pull XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets docker tag XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets quay.io/rhacs-eng/qa:XXXXXXXXXXXX-dkr-ecr-XXXXXXXXX-amazonaws-com-stackrox-qa-ecr-test-registry-image-no-secrets docker push quay.io/rhacs-eng/qa:XXXXXXXXXXXX-dkr-ecr-XXXXXXXXX-amazonaws-com-stackrox-qa-ecr-test-registry-image-no-secrets ImageScanningTest STANDARD_OUT 04:58:38 | INFO | ImageScanningTest | ImageScanningTest | Starting testsuite 04:58:43 | DEBUG | ImageScanningTest | Kubernetes | gcr-image-pull-secret: Secret removed. 04:58:43 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: f6b1518c-8904-4bce-889e-2a3521e784ce 04:58:43 | INFO | ImageScanningTest | OpenShift | Created namespace qa-image-scanning-test 04:58:43 | INFO | ImageScanningTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-image-scanning-test namespace. 04:58:43 | DEBUG | ImageScanningTest | Kubernetes | quay: secret created. 04:58:44 | DEBUG | ImageScanningTest | Kubernetes | default-dockercfg-9g79g: secret created. 04:58:44 | DEBUG | ImageScanningTest | Kubernetes | redhat-image-pull-secret: secret created. 04:58:44 | DEBUG | ImageScanningTest | Kubernetes | public-dockerhub: secret created. 04:58:44 | DEBUG | ImageScanningTest | OpenShift | Adding system:serviceaccount:qa-image-scanning-test:default to anyuid user list ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - openssl-libs:1:1.0.2k-12.el7 - quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 - RHSA-2019:0483 - 0 STANDARD_OUT 04:58:44 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Stackrox Scanner - openssl-libs:1:1.0.2k-12.el7 - quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 - RHSA-2019:0483 - 0 04:58:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 04:58:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 1914b8ce-c2e7-40a4-b0ad-250f55175daf 04:58:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 1914b8ce-c2e7-40a4-b0ad-250f55175daf 04:58:51 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 04:58:51 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 04:59:11 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 04:59:11 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422. 1 -v- 1 04:59:11 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 1914b8ce-c2e7-40a4-b0ad-250f55175daf 04:59:11 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - openssl-libs:1:1.0.2k-12.el7 - quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 - RHSA-2019:0483 - 0 PASSED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - openssl-libs:1:1.0.2k-12.el7 - quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 - CVE-2018-0735 - 0 STANDARD_OUT 04:59:11 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Stackrox Scanner - openssl-libs:1:1.0.2k-12.el7 - quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 - CVE-2018-0735 - 0 04:59:11 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 04:59:11 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: df6283ce-1b35-43bb-9b67-80ae8ea59b38 04:59:12 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: df6283ce-1b35-43bb-9b67-80ae8ea59b38 04:59:14 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 04:59:14 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 04:59:34 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 04:59:34 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422. 1 -v- 1 04:59:34 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: df6283ce-1b35-43bb-9b67-80ae8ea59b38 04:59:34 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - openssl-libs:1:1.0.2k-12.el7 - quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 - CVE-2018-0735 - 0 PASSED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - systemd:229-4ubuntu21.29 - quay.io/rhacs-eng/qa:oci-manifest - CVE-2021-33910 - 0 STANDARD_OUT 04:59:34 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Stackrox Scanner - systemd:229-4ubuntu21.29 - quay.io/rhacs-eng/qa:oci-manifest - CVE-2021-33910 - 0 04:59:34 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 04:59:34 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: c2fdaf22-0a09-4d2a-b11f-24e06a7965e7 04:59:34 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: c2fdaf22-0a09-4d2a-b11f-24e06a7965e7 04:59:38 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 04:59:38 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 04:59:58 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:oci-manifest 04:59:58 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa:oci-manifest. 1 -v- 1 04:59:58 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: c2fdaf22-0a09-4d2a-b11f-24e06a7965e7 04:59:58 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - systemd:229-4ubuntu21.29 - quay.io/rhacs-eng/qa:oci-manifest - CVE-2021-33910 - 0 PASSED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - glibc:2.35-0ubuntu3.1 - quay.io/rhacs-eng/qa:list-image-oci-manifest - CVE-2023-4911 - 4 STANDARD_OUT 04:59:58 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Stackrox Scanner - glibc:2.35-0ubuntu3.1 - quay.io/rhacs-eng/qa:list-image-oci-manifest - CVE-2023-4911 - 4 04:59:58 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 04:59:58 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: dff9d272-3b1d-4e58-9355-7cc49553f325 04:59:58 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: dff9d272-3b1d-4e58-9355-7cc49553f325 05:00:02 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:00:02 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:00:22 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:list-image-oci-manifest 05:00:22 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa:list-image-oci-manifest. 1 -v- 1 05:00:22 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: dff9d272-3b1d-4e58-9355-7cc49553f325 05:00:22 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - glibc:2.35-0ubuntu3.1 - quay.io/rhacs-eng/qa:list-image-oci-manifest - CVE-2023-4911 - 4 PASSED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair Scanner - apt:1.4.8 - quay.io/rhacs-eng/qa:nginx-1-12-1 - CVE-2011-3374 - 0 STANDARD_OUT 05:00:22 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Clair Scanner - apt:1.4.8 - quay.io/rhacs-eng/qa:nginx-1-12-1 - CVE-2011-3374 - 0 05:00:22 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:00:22 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:00:22 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair Scanner - apt:1.4.8 - quay.io/rhacs-eng/qa:nginx-1-12-1 - CVE-2011-3374 - 0 SKIPPED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair Scanner - bash:4.4-5 - quay.io/rhacs-eng/qa:nginx-1-12-1 - CVE-2019-18276 - 0 STANDARD_OUT 05:00:22 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Clair Scanner - bash:4.4-5 - quay.io/rhacs-eng/qa:nginx-1-12-1 - CVE-2019-18276 - 0 05:00:22 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:00:22 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:00:22 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair Scanner - bash:4.4-5 - quay.io/rhacs-eng/qa:nginx-1-12-1 - CVE-2019-18276 - 0 SKIPPED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair v4 Scanner - openssl-libs:1:1.1.1-8.el8 - registry.access.redhat.com/ubi8:8.0-208 - RHSA-2021:1024 - 0 STANDARD_OUT 05:00:22 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Clair v4 Scanner - openssl-libs:1:1.1.1-8.el8 - registry.access.redhat.com/ubi8:8.0-208 - RHSA-2021:1024 - 0 05:00:23 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:00:23 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:00:23 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair v4 Scanner - openssl-libs:1:1.1.1-8.el8 - registry.access.redhat.com/ubi8:8.0-208 - RHSA-2021:1024 - 0 SKIPPED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair v4 Scanner - platform-python-pip:9.0.3-13.el8 - registry.access.redhat.com/ubi8:8.0-208 - RHSA-2020:4432 - 0 STANDARD_OUT 05:00:23 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Clair v4 Scanner - platform-python-pip:9.0.3-13.el8 - registry.access.redhat.com/ubi8:8.0-208 - RHSA-2020:4432 - 0 05:00:23 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:00:23 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:00:23 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair v4 Scanner - platform-python-pip:9.0.3-13.el8 - registry.access.redhat.com/ubi8:8.0-208 - RHSA-2020:4432 - 0 SKIPPED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - java-17-openjdk-headless:1:17.0.11.0.9-2.el8.x86_64 - quay.io/rhacs-eng/qa:lineage-jdk-17.0.11 - - 135 STANDARD_OUT 05:00:23 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Stackrox Scanner - java-17-openjdk-headless:1:17.0.11.0.9-2.el8.x86_64 - quay.io/rhacs-eng/qa:lineage-jdk-17.0.11 - - 135 05:00:23 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:00:23 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 7739bcb5-7509-463a-82ef-56c01d5614aa 05:00:23 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 7739bcb5-7509-463a-82ef-56c01d5614aa 05:00:30 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:00:30 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:00:50 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:lineage-jdk-17.0.11 05:00:50 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa:lineage-jdk-17.0.11. 1 -v- 1 05:00:50 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 7739bcb5-7509-463a-82ef-56c01d5614aa 05:00:50 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - java-17-openjdk-headless:1:17.0.11.0.9-2.el8.x86_64 - quay.io/rhacs-eng/qa:lineage-jdk-17.0.11 - - 135 PASSED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - java-17-openjdk-headless:1:17.0.13.0.11-3.el8.x86_64 - quay.io/rhacs-eng/qa:lineage-jdk-17.0.13 - - 137 STANDARD_OUT 05:00:50 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Stackrox Scanner - java-17-openjdk-headless:1:17.0.13.0.11-3.el8.x86_64 - quay.io/rhacs-eng/qa:lineage-jdk-17.0.13 - - 137 05:00:50 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:00:50 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 6fa5810d-1de4-4e2f-828c-b7fa79b12378 05:00:50 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 6fa5810d-1de4-4e2f-828c-b7fa79b12378 05:00:56 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:00:56 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:01:16 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:lineage-jdk-17.0.13 05:01:16 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa:lineage-jdk-17.0.13. 1 -v- 1 05:01:16 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 6fa5810d-1de4-4e2f-828c-b7fa79b12378 05:01:16 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - java-17-openjdk-headless:1:17.0.13.0.11-3.el8.x86_64 - quay.io/rhacs-eng/qa:lineage-jdk-17.0.13 - - 137 PASSED ImageScanningTest > Verify Scan Results from Registries - #registry.name() - #component:#version - #image - #cve - #idx > Verify Scan Results from Registries - Google Artifact Registry - gcc-8:8.3.0-6 - us-west1-docker.pkg.dev/acs-san-stackroxci/artifact-registry-test/nginx:1.17 - CVE-2018-12886 - 0 STANDARD_OUT 05:01:16 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Scan Results from Registries - Google Artifact Registry - gcc-8:8.3.0-6 - us-west1-docker.pkg.dev/acs-san-stackroxci/artifact-registry-test/nginx:1.17 - CVE-2018-12886 - 0 05:01:16 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:01:17 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 2fbb722f-8046-417e-8c4f-e7ae385a2dbd 05:01:17 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 2fbb722f-8046-417e-8c4f-e7ae385a2dbd 05:01:17 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: google-artifact-registry 05:01:17 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: google-artifact-registry: 3659cbb8-911d-4a71-8ea2-69d9197615b6 05:01:17 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: google-artifact-registry: 3659cbb8-911d-4a71-8ea2-69d9197615b6 05:01:23 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:01:23 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:01:43 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:us-west1-docker.pkg.dev/acs-san-stackroxci/artifact-registry-test/nginx:1.17 05:01:43 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:us-west1-docker.pkg.dev/acs-san-stackroxci/artifact-registry-test/nginx:1.17. 1 -v- 1 05:01:43 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 3659cbb8-911d-4a71-8ea2-69d9197615b6 05:01:43 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Scan Results from Registries - #registry.name() - #component:#version - #image - #cve - #idx > Verify Scan Results from Registries - Google Artifact Registry - gcc-8:8.3.0-6 - us-west1-docker.pkg.dev/acs-san-stackroxci/artifact-registry-test/nginx:1.17 - CVE-2018-12886 - 0 PASSED ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Clair Scanner - image does not exist STANDARD_OUT 05:01:43 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify image scan exceptions - Clair Scanner - image does not exist 05:01:43 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:01:43 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:01:43 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Clair Scanner - image does not exist SKIPPED ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Stackrox Scanner - image does not exist STANDARD_OUT 05:01:43 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify image scan exceptions - Stackrox Scanner - image does not exist 05:01:43 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:01:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: a46903b5-a54d-4937-949f-653b072841b3 05:01:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: a46903b5-a54d-4937-949f-653b072841b3 05:01:44 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:01:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: a46903b5-a54d-4937-949f-653b072841b3 05:01:44 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Stackrox Scanner - image does not exist PASSED ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Clair Scanner - missing required registry STANDARD_OUT 05:01:44 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify image scan exceptions - Clair Scanner - missing required registry 05:01:44 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:01:44 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:01:44 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Clair Scanner - missing required registry SKIPPED ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Stackrox Scanner - missing required registry STANDARD_OUT 05:01:44 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify image scan exceptions - Stackrox Scanner - missing required registry 05:01:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:01:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 3b0df395-8402-4ed4-b23b-f847cd0fce93 05:01:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 3b0df395-8402-4ed4-b23b-f847cd0fce93 05:01:44 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:01:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 3b0df395-8402-4ed4-b23b-f847cd0fce93 05:01:44 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Stackrox Scanner - missing required registry PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-iam STANDARD_OUT 05:01:44 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - ecr-iam 05:01:44 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:01:44 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:01:44 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-iam SKIPPED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-assume-role STANDARD_OUT 05:01:44 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - ecr-assume-role 05:01:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: ecr 05:01:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: ecr: f07632c4-ee3c-41af-a35a-d82588700463 05:01:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: ecr: f07632c4-ee3c-41af-a35a-d82588700463 05:01:45 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: secret created. 05:02:05 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:02:05 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace ecr-assume-role--ecr-image-registry-test 05:02:05 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-assume-role--ecr-image-registry-test to start 05:02:05 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-assume-role--ecr-image-registry-test's pods: 05:02:05 | DEBUG | ImageScanningTest | Kubernetes | - ecr-assume-role--ecr-image-registry-test-6d5d8b746d-ptrbk Container status: [] 05:02:05 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for ecr-assume-role--ecr-image-registry-test 05:02:08 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-assume-role--ecr-image-registry-test to start 05:02:08 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-assume-role--ecr-image-registry-test's pods: 05:02:08 | DEBUG | ImageScanningTest | Kubernetes | - ecr-assume-role--ecr-image-registry-test-6d5d8b746d-ptrbk Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:02:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:02:08 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for ecr-assume-role--ecr-image-registry-test 05:02:08 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment ecr-assume-role--ecr-image-registry-test 05:02:08 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment ecr-assume-role--ecr-image-registry-test with 1 pods 05:02:08 | INFO | ImageScanningTest | Services | SR found deployment ecr-assume-role--ecr-image-registry-test within 0s 05:02:15 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:02:15 | INFO | ImageScanningTest | Services | violation size is: 1 05:02:15 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:02:15 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:02:15 | INFO | ImageScanningTest | Services | violation size is: 1 05:02:15 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:02:15 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:02:20 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: Secret removed. 05:02:20 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: ecr-assume-role--ecr-image-registry-test 05:02:20 | DEBUG | ImageScanningTest | Kubernetes | ecr-assume-role--ecr-image-registry-test: deployment removed. 05:02:20 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:02:40 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets 05:02:40 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets. 1 -v- 1 05:02:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: f07632c4-ee3c-41af-a35a-d82588700463 05:02:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 004e3ff5-82b2-4f49-850f-75585d42bd18 05:02:40 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-assume-role PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-assume-role-external-id STANDARD_OUT 05:02:40 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - ecr-assume-role-external-id 05:02:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: ecr 05:02:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: ecr: bec87b88-c77d-4208-9334-0e7c677a5c0e 05:02:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: ecr: bec87b88-c77d-4208-9334-0e7c677a5c0e 05:02:40 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: secret created. 05:03:00 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:03:00 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace ecr-assume-role-external-id--ecr-image-registry-test 05:03:00 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-assume-role-external-id--ecr-image-registry-test to start 05:03:00 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-assume-role-external-id--ecr-image-registry-test's pods: 05:03:00 | DEBUG | ImageScanningTest | Kubernetes | - ecr-assume-role-external-id--ecr-image-registry-test-587b8v5c29 Container status: [] 05:03:00 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for ecr-assume-role-external-id--ecr-image-registry-test 05:03:03 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-assume-role-external-id--ecr-image-registry-test to start 05:03:03 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-assume-role-external-id--ecr-image-registry-test's pods: 05:03:03 | DEBUG | ImageScanningTest | Kubernetes | - ecr-assume-role-external-id--ecr-image-registry-test-587b8v5c29 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:03:01Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:03:03 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for ecr-assume-role-external-id--ecr-image-registry-test 05:03:03 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment ecr-assume-role-external-id--ecr-image-registry-test 05:03:03 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment ecr-assume-role-external-id--ecr-image-registry-test with 1 pods 05:03:04 | INFO | ImageScanningTest | Services | SR found deployment ecr-assume-role-external-id--ecr-image-registry-test within 0s 05:03:11 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:03:11 | INFO | ImageScanningTest | Services | violation size is: 1 05:03:11 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:03:11 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:03:11 | INFO | ImageScanningTest | Services | violation size is: 1 05:03:11 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:03:11 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:03:16 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: Secret removed. 05:03:16 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: ecr-assume-role-external-id--ecr-image-registry-test 05:03:16 | DEBUG | ImageScanningTest | Kubernetes | ecr-assume-role-external-id--ecr-image-registry-test: deployment removed. 05:03:16 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:03:36 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets 05:03:36 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets. 1 -v- 1 05:03:36 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: bec87b88-c77d-4208-9334-0e7c677a5c0e 05:03:36 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 99cf413d-badd-4f0f-b608-39e56ea00563 05:03:36 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-assume-role-external-id PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-auto STANDARD_OUT 05:03:36 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - ecr-auto 05:03:36 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: secret created. 05:03:56 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:03:56 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace ecr-auto--ecr-image-registry-test 05:03:56 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-auto--ecr-image-registry-test to start 05:03:56 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-auto--ecr-image-registry-test's pods: 05:03:56 | DEBUG | ImageScanningTest | Kubernetes | - ecr-auto--ecr-image-registry-test-6655d6c4cb-6g7lp Container status: [] 05:03:56 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for ecr-auto--ecr-image-registry-test 05:03:59 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-auto--ecr-image-registry-test to start 05:03:59 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-auto--ecr-image-registry-test's pods: 05:03:59 | DEBUG | ImageScanningTest | Kubernetes | - ecr-auto--ecr-image-registry-test-6655d6c4cb-6g7lp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:03:57Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:03:59 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for ecr-auto--ecr-image-registry-test 05:03:59 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment ecr-auto--ecr-image-registry-test 05:03:59 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment ecr-auto--ecr-image-registry-test with 1 pods 05:03:59 | INFO | ImageScanningTest | Services | SR found deployment ecr-auto--ecr-image-registry-test within 0s 05:04:06 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:04:06 | INFO | ImageScanningTest | Services | violation size is: 1 05:04:06 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:04:06 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:04:06 | INFO | ImageScanningTest | Services | violation size is: 1 05:04:06 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:04:06 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:04:11 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: Secret removed. 05:04:11 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: ecr-auto--ecr-image-registry-test 05:04:11 | DEBUG | ImageScanningTest | Kubernetes | ecr-auto--ecr-image-registry-test: deployment removed. 05:04:11 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:04:31 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets 05:04:31 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets. 1 -v- 1 05:04:31 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 2862e575-2b2a-4fb4-96a1-b984b6bb2aa8 05:04:31 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-auto PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-auto-and-config STANDARD_OUT 05:04:31 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - ecr-auto-and-config 05:04:31 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: ecr 05:04:32 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: ecr: 485f4806-190f-4bd7-8cd4-6ef3d8c24cbf 05:04:32 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: ecr: 485f4806-190f-4bd7-8cd4-6ef3d8c24cbf 05:04:32 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: secret created. 05:04:52 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:04:52 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace ecr-auto-and-config--ecr-image-registry-test 05:04:52 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-auto-and-config--ecr-image-registry-test to start 05:04:52 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-auto-and-config--ecr-image-registry-test's pods: 05:04:52 | DEBUG | ImageScanningTest | Kubernetes | - ecr-auto-and-config--ecr-image-registry-test-54bdbbf8-pp7xd Container status: [] 05:04:52 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for ecr-auto-and-config--ecr-image-registry-test 05:04:55 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-auto-and-config--ecr-image-registry-test to start 05:04:55 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-auto-and-config--ecr-image-registry-test's pods: 05:04:55 | DEBUG | ImageScanningTest | Kubernetes | - ecr-auto-and-config--ecr-image-registry-test-54bdbbf8-pp7xd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:04:52Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:04:55 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for ecr-auto-and-config--ecr-image-registry-test 05:04:55 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment ecr-auto-and-config--ecr-image-registry-test 05:04:55 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment ecr-auto-and-config--ecr-image-registry-test with 1 pods 05:04:55 | INFO | ImageScanningTest | Services | SR found deployment ecr-auto-and-config--ecr-image-registry-test within 0s 05:05:02 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:05:02 | INFO | ImageScanningTest | Services | violation size is: 1 05:05:02 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:05:02 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:05:02 | INFO | ImageScanningTest | Services | violation size is: 1 05:05:02 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:05:02 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:05:07 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: Secret removed. 05:05:07 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: ecr-auto-and-config--ecr-image-registry-test 05:05:07 | DEBUG | ImageScanningTest | Kubernetes | ecr-auto-and-config--ecr-image-registry-test: deployment removed. 05:05:07 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:05:27 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets 05:05:27 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets. 1 -v- 1 05:05:27 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 485f4806-190f-4bd7-8cd4-6ef3d8c24cbf 05:05:27 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 6221ae6d-d295-4c30-9689-4bbe59c66448 05:05:27 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-auto-and-config PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-config-only STANDARD_OUT 05:05:27 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - ecr-config-only 05:05:27 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: ecr 05:05:27 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: ecr: ec794c5d-5f4c-49be-ab7d-ef86a3ff67e9 05:05:27 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: ecr: ec794c5d-5f4c-49be-ab7d-ef86a3ff67e9 05:05:27 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: secret created. 05:05:47 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: a88891dd-5d31-4d8c-90a6-0521dae9480e 05:05:47 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:05:48 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace ecr-config-only--ecr-image-registry-test 05:05:48 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-config-only--ecr-image-registry-test to start 05:05:48 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-config-only--ecr-image-registry-test's pods: 05:05:48 | DEBUG | ImageScanningTest | Kubernetes | - ecr-config-only--ecr-image-registry-test-56f9667d84-tqrlx Container status: [] 05:05:48 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for ecr-config-only--ecr-image-registry-test 05:05:51 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-config-only--ecr-image-registry-test to start 05:05:51 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-config-only--ecr-image-registry-test's pods: 05:05:51 | DEBUG | ImageScanningTest | Kubernetes | - ecr-config-only--ecr-image-registry-test-56f9667d84-tqrlx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:05:48Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:05:51 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for ecr-config-only--ecr-image-registry-test 05:05:51 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment ecr-config-only--ecr-image-registry-test 05:05:51 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment ecr-config-only--ecr-image-registry-test with 1 pods 05:05:51 | INFO | ImageScanningTest | Services | SR found deployment ecr-config-only--ecr-image-registry-test within 0s 05:05:57 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:05:57 | INFO | ImageScanningTest | Services | violation size is: 1 05:05:57 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:05:57 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:05:57 | INFO | ImageScanningTest | Services | violation size is: 1 05:05:57 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:05:57 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:06:02 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: Secret removed. 05:06:02 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: ecr-config-only--ecr-image-registry-test 05:06:03 | DEBUG | ImageScanningTest | Kubernetes | ecr-config-only--ecr-image-registry-test: deployment removed. 05:06:03 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:06:23 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets 05:06:23 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets. 1 -v- 1 05:06:23 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: ec794c5d-5f4c-49be-ab7d-ef86a3ff67e9 05:06:23 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-config-only PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - acr-auto STANDARD_OUT 05:06:23 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - acr-auto 05:06:23 | DEBUG | ImageScanningTest | Kubernetes | acr-image-registry-test: secret created. 05:06:43 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:06:43 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace acr-auto--acr-image-registry-test 05:06:43 | DEBUG | ImageScanningTest | Kubernetes | Waiting for acr-auto--acr-image-registry-test to start 05:06:43 | DEBUG | ImageScanningTest | Kubernetes | Status of acr-auto--acr-image-registry-test's pods: 05:06:43 | DEBUG | ImageScanningTest | Kubernetes | - acr-auto--acr-image-registry-test-67d59bfb85-nl26j Container status: [] 05:06:43 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for acr-auto--acr-image-registry-test 05:06:46 | DEBUG | ImageScanningTest | Kubernetes | Waiting for acr-auto--acr-image-registry-test to start 05:06:46 | DEBUG | ImageScanningTest | Kubernetes | Status of acr-auto--acr-image-registry-test's pods: 05:06:46 | DEBUG | ImageScanningTest | Kubernetes | - acr-auto--acr-image-registry-test-67d59bfb85-nl26j Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:06:44Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:06:46 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for acr-auto--acr-image-registry-test 05:06:46 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment acr-auto--acr-image-registry-test 05:06:46 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment acr-auto--acr-image-registry-test with 1 pods 05:06:46 | INFO | ImageScanningTest | Services | SR found deployment acr-auto--acr-image-registry-test within 0s 05:06:53 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:06:53 | INFO | ImageScanningTest | Services | violation size is: 1 05:06:53 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:06:53 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:06:53 | INFO | ImageScanningTest | Services | violation size is: 1 05:06:53 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:06:53 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:06:58 | DEBUG | ImageScanningTest | Kubernetes | acr-image-registry-test: Secret removed. 05:06:58 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: acr-auto--acr-image-registry-test 05:06:58 | DEBUG | ImageScanningTest | Kubernetes | acr-auto--acr-image-registry-test: deployment removed. 05:06:58 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:07:18 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:stackroxci.azurecr.io/stackroxci/registry-image:0.3 05:07:18 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:stackroxci.azurecr.io/stackroxci/registry-image:0.3. 1 -v- 1 05:07:18 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 05b4c570-5648-46f2-8523-21adead19d96 05:07:18 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - acr-auto PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - acr-auto-and-config STANDARD_OUT 05:07:18 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - acr-auto-and-config 05:07:18 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: acr 05:07:18 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: acr: 16bdfbdd-cca2-4046-8f14-74137475b84c 05:07:18 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: acr: 16bdfbdd-cca2-4046-8f14-74137475b84c 05:07:18 | DEBUG | ImageScanningTest | Kubernetes | acr-image-registry-test: secret created. 05:07:38 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:07:38 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace acr-auto-and-config--acr-image-registry-test 05:07:38 | DEBUG | ImageScanningTest | Kubernetes | Waiting for acr-auto-and-config--acr-image-registry-test to start 05:07:38 | DEBUG | ImageScanningTest | Kubernetes | Status of acr-auto-and-config--acr-image-registry-test's pods: 05:07:38 | DEBUG | ImageScanningTest | Kubernetes | - acr-auto-and-config--acr-image-registry-test-86cd8bc56c-9hrfz Container status: [] 05:07:38 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for acr-auto-and-config--acr-image-registry-test 05:07:41 | DEBUG | ImageScanningTest | Kubernetes | Waiting for acr-auto-and-config--acr-image-registry-test to start 05:07:41 | DEBUG | ImageScanningTest | Kubernetes | Status of acr-auto-and-config--acr-image-registry-test's pods: 05:07:41 | DEBUG | ImageScanningTest | Kubernetes | - acr-auto-and-config--acr-image-registry-test-86cd8bc56c-9hrfz Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:07:39Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:07:41 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for acr-auto-and-config--acr-image-registry-test 05:07:41 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment acr-auto-and-config--acr-image-registry-test 05:07:41 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment acr-auto-and-config--acr-image-registry-test with 1 pods 05:07:41 | INFO | ImageScanningTest | Services | SR found deployment acr-auto-and-config--acr-image-registry-test within 0s 05:07:48 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:07:48 | INFO | ImageScanningTest | Services | violation size is: 1 05:07:48 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:07:48 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:07:48 | INFO | ImageScanningTest | Services | violation size is: 1 05:07:48 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:07:48 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:07:53 | DEBUG | ImageScanningTest | Kubernetes | acr-image-registry-test: Secret removed. 05:07:53 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: acr-auto-and-config--acr-image-registry-test 05:07:53 | DEBUG | ImageScanningTest | Kubernetes | acr-auto-and-config--acr-image-registry-test: deployment removed. 05:07:54 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:08:14 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:stackroxci.azurecr.io/stackroxci/registry-image:0.3 05:08:14 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:stackroxci.azurecr.io/stackroxci/registry-image:0.3. 1 -v- 1 05:08:14 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 16bdfbdd-cca2-4046-8f14-74137475b84c 05:08:14 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: c332ca47-ab57-4faf-b6db-1152d61e044c 05:08:14 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - acr-auto-and-config PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - acr-config-only STANDARD_OUT 05:08:14 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - acr-config-only 05:08:14 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: acr 05:08:14 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: acr: 1e5f5787-d4a0-48cd-90f4-728cdfb9b23c 05:08:14 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: acr: 1e5f5787-d4a0-48cd-90f4-728cdfb9b23c 05:08:14 | DEBUG | ImageScanningTest | Kubernetes | acr-image-registry-test: secret created. 05:08:34 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: ae105ac7-9111-4e03-8c9c-0c922a1cbe9c 05:08:34 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:08:34 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace acr-config-only--acr-image-registry-test 05:08:34 | DEBUG | ImageScanningTest | Kubernetes | Waiting for acr-config-only--acr-image-registry-test to start 05:08:34 | DEBUG | ImageScanningTest | Kubernetes | Status of acr-config-only--acr-image-registry-test's pods: 05:08:34 | DEBUG | ImageScanningTest | Kubernetes | - acr-config-only--acr-image-registry-test-67d6d889d5-4brkh Container status: [] 05:08:34 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for acr-config-only--acr-image-registry-test 05:08:37 | DEBUG | ImageScanningTest | Kubernetes | Waiting for acr-config-only--acr-image-registry-test to start 05:08:37 | DEBUG | ImageScanningTest | Kubernetes | Status of acr-config-only--acr-image-registry-test's pods: 05:08:37 | DEBUG | ImageScanningTest | Kubernetes | - acr-config-only--acr-image-registry-test-67d6d889d5-4brkh Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:08:35Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:08:37 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for acr-config-only--acr-image-registry-test 05:08:37 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment acr-config-only--acr-image-registry-test 05:08:37 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment acr-config-only--acr-image-registry-test with 1 pods 05:08:37 | INFO | ImageScanningTest | Services | SR found deployment acr-config-only--acr-image-registry-test within 0s 05:08:44 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:08:44 | INFO | ImageScanningTest | Services | violation size is: 1 05:08:44 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:08:44 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:08:44 | INFO | ImageScanningTest | Services | violation size is: 1 05:08:44 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:08:44 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:08:49 | DEBUG | ImageScanningTest | Kubernetes | acr-image-registry-test: Secret removed. 05:08:49 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: acr-config-only--acr-image-registry-test 05:08:49 | DEBUG | ImageScanningTest | Kubernetes | acr-config-only--acr-image-registry-test: deployment removed. 05:08:49 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:09:09 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:stackroxci.azurecr.io/stackroxci/registry-image:0.3 05:09:09 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:stackroxci.azurecr.io/stackroxci/registry-image:0.3. 1 -v- 1 05:09:09 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 1e5f5787-d4a0-48cd-90f4-728cdfb9b23c 05:09:09 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - acr-config-only PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - quay-auto STANDARD_OUT 05:09:09 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - quay-auto 05:09:09 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: bd5c8cbf-1cf1-4453-9716-c4faddd147fc 05:09:09 | DEBUG | ImageScanningTest | Kubernetes | quay-image-scanning-test: secret created. 05:09:29 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:09:29 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace quay-auto--quay-image-scanning-test 05:09:29 | DEBUG | ImageScanningTest | Kubernetes | Waiting for quay-auto--quay-image-scanning-test to start 05:09:29 | DEBUG | ImageScanningTest | Kubernetes | Status of quay-auto--quay-image-scanning-test's pods: 05:09:29 | DEBUG | ImageScanningTest | Kubernetes | - quay-auto--quay-image-scanning-test-7c4ccffcf4-xpmd2 Container status: [] 05:09:29 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for quay-auto--quay-image-scanning-test 05:09:32 | DEBUG | ImageScanningTest | Kubernetes | Waiting for quay-auto--quay-image-scanning-test to start 05:09:32 | DEBUG | ImageScanningTest | Kubernetes | Status of quay-auto--quay-image-scanning-test's pods: 05:09:32 | DEBUG | ImageScanningTest | Kubernetes | - quay-auto--quay-image-scanning-test-7c4ccffcf4-xpmd2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:09:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:09:32 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for quay-auto--quay-image-scanning-test 05:09:32 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment quay-auto--quay-image-scanning-test 05:09:32 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment quay-auto--quay-image-scanning-test with 1 pods 05:09:33 | INFO | ImageScanningTest | Services | SR found deployment quay-auto--quay-image-scanning-test within 0s 05:09:39 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:09:39 | INFO | ImageScanningTest | Services | violation size is: 1 05:09:39 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:09:39 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:09:39 | INFO | ImageScanningTest | Services | violation size is: 1 05:09:39 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:09:39 | INFO | ImageScanningTest | BaseSpecification | Adding core image registry integration 05:09:39 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: core quay 05:09:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: core quay: c3946582-12f1-41ad-abed-07f6caff2315 05:09:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: core quay: c3946582-12f1-41ad-abed-07f6caff2315 05:09:40 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:09:45 | DEBUG | ImageScanningTest | Kubernetes | quay-image-scanning-test: Secret removed. 05:09:45 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: quay-auto--quay-image-scanning-test 05:09:45 | DEBUG | ImageScanningTest | Kubernetes | quay-auto--quay-image-scanning-test: deployment removed. 05:09:45 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:10:05 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:registry-image-0-3 05:10:05 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa:registry-image-0-3. 1 -v- 1 05:10:05 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: e6a77d16-03d8-4449-971e-247c3db62006 05:10:05 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - quay-auto PASSED ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null registry.k8s.io/ip-masq-agent-amd64:v2.4.1 from stackrox STANDARD_OUT 05:10:05 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image scanning test to check if scan time is not null registry.k8s.io/ip-masq-agent-amd64:v2.4.1 from stackrox 05:10:05 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:10:05 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 5d72d98f-0ae9-414a-bb87-d070a6354938 05:10:05 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 5d72d98f-0ae9-414a-bb87-d070a6354938 05:10:13 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:10:13 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:10:33 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:registry.k8s.io/ip-masq-agent-amd64:v2.4.1 05:10:33 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:registry.k8s.io/ip-masq-agent-amd64:v2.4.1. 1 -v- 1 05:10:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 5d72d98f-0ae9-414a-bb87-d070a6354938 05:10:33 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null registry.k8s.io/ip-masq-agent-amd64:v2.4.1 from stackrox PASSED ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null quay.io/rhacs-eng/qa:alpine-3.16.0 from stackrox STANDARD_OUT 05:10:33 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image scanning test to check if scan time is not null quay.io/rhacs-eng/qa:alpine-3.16.0 from stackrox 05:10:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:10:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 29fdeac6-7e21-4c20-bec5-1b6f3d9fd620 05:10:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 29fdeac6-7e21-4c20-bec5-1b6f3d9fd620 05:10:42 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:10:42 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:11:02 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:alpine-3.16.0 05:11:02 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa:alpine-3.16.0. 1 -v- 1 05:11:02 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 29fdeac6-7e21-4c20-bec5-1b6f3d9fd620 05:11:02 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null quay.io/rhacs-eng/qa:alpine-3.16.0 from stackrox PASSED ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null quay.io/stackrox-io/scanner:2.27.3 from stackrox STANDARD_OUT 05:11:02 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image scanning test to check if scan time is not null quay.io/stackrox-io/scanner:2.27.3 from stackrox 05:11:02 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:11:02 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 67038bef-6bb7-4d66-9555-091be6ae0dac 05:11:02 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 67038bef-6bb7-4d66-9555-091be6ae0dac 05:11:15 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:11:15 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:11:35 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/stackrox-io/scanner:2.27.3 05:11:35 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/stackrox-io/scanner:2.27.3. 1 -v- 1 05:11:35 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 67038bef-6bb7-4d66-9555-091be6ae0dac 05:11:35 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null quay.io/stackrox-io/scanner:2.27.3 from stackrox PASSED ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null gke.gcr.io/heapster:v1.7.2 from stackrox STANDARD_OUT 05:11:35 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image scanning test to check if scan time is not null gke.gcr.io/heapster:v1.7.2 from stackrox 05:11:35 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:11:36 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 5597bb82-e519-4767-8362-0b8c7f612dc6 05:11:36 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 5597bb82-e519-4767-8362-0b8c7f612dc6 05:11:44 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:11:44 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:12:04 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:gke.gcr.io/heapster:v1.7.2 05:12:04 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:gke.gcr.io/heapster:v1.7.2. 1 -v- 1 05:12:04 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 5597bb82-e519-4767-8362-0b8c7f612dc6 05:12:04 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null gke.gcr.io/heapster:v1.7.2 from stackrox PASSED ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null mcr.microsoft.com/dotnet/core/runtime:2.1-alpine from stackrox STANDARD_OUT 05:12:04 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image scanning test to check if scan time is not null mcr.microsoft.com/dotnet/core/runtime:2.1-alpine from stackrox 05:12:04 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:12:04 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 09a1f7bb-dffd-4112-9e67-6885227e6d0a 05:12:04 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 09a1f7bb-dffd-4112-9e67-6885227e6d0a 05:12:13 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:12:13 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:12:33 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:mcr.microsoft.com/dotnet/core/runtime:2.1-alpine 05:12:33 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:mcr.microsoft.com/dotnet/core/runtime:2.1-alpine. 1 -v- 1 05:12:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 09a1f7bb-dffd-4112-9e67-6885227e6d0a 05:12:33 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null mcr.microsoft.com/dotnet/core/runtime:2.1-alpine from stackrox PASSED ImageScanningTest > Validate basic image details across all current images in StackRox STANDARD_OUT 05:12:33 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Validate basic image details across all current images in StackRox 05:12:49 | INFO | ImageScanningTest | ImageScanningTest | [:] 05:12:49 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:12:49 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Validate basic image details across all current images in StackRox PASSED ImageScanningTest > Validate image deletion does not affect other images STANDARD_OUT 05:12:49 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Validate image deletion does not affect other images 05:12:49 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:12:49 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 4edd6517-1e66-4c47-857c-f276510c2be1 05:12:49 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 4edd6517-1e66-4c47-857c-f276510c2be1 05:12:52 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:centos7-base-echo 05:12:52 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:12:52 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Validate image deletion does not affect other images PASSED ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay registry with token STANDARD_OUT 05:12:52 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Quay registry and scanner supports token and/or robot credentials - quay registry with token 05:12:52 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: c3946582-12f1-41ad-abed-07f6caff2315 05:12:52 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:12:52 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 8d11abd1-5311-4a82-a517-0405bd88de51 05:12:52 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 8d11abd1-5311-4a82-a517-0405bd88de51 05:12:52 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: quay 05:12:53 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: quay: 18a2c088-9aa1-46fb-bca1-48c498eaa4a4 05:12:53 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: quay: 18a2c088-9aa1-46fb-bca1-48c498eaa4a4 05:13:02 | INFO | ImageScanningTest | BaseSpecification | Adding core image registry integration 05:13:03 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: core quay 05:13:03 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: core quay: e6a25858-a11d-49dd-807b-7c50c32fb964 05:13:03 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: core quay: e6a25858-a11d-49dd-807b-7c50c32fb964 05:13:03 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:13:03 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 18a2c088-9aa1-46fb-bca1-48c498eaa4a4 05:13:03 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay registry with token PASSED ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay with robot creds only STANDARD_OUT 05:13:03 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Quay registry and scanner supports token and/or robot credentials - quay with robot creds only 05:13:03 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: e6a25858-a11d-49dd-807b-7c50c32fb964 05:13:03 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:13:03 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 39c83c3d-dcc7-4c9a-bba3-ea88d6bf2ddb 05:13:03 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 39c83c3d-dcc7-4c9a-bba3-ea88d6bf2ddb 05:13:03 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: quay 05:13:04 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: quay: 29d724ba-ace1-4ba5-b0ed-2ce0a12595a6 05:13:04 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: quay: 29d724ba-ace1-4ba5-b0ed-2ce0a12595a6 05:13:05 | INFO | ImageScanningTest | BaseSpecification | Adding core image registry integration 05:13:05 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: core quay 05:13:05 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: core quay: 13035599-58b7-43d2-b963-70084d68f1dd 05:13:05 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: core quay: 13035599-58b7-43d2-b963-70084d68f1dd 05:13:05 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:13:05 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 29d724ba-ace1-4ba5-b0ed-2ce0a12595a6 05:13:05 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay with robot creds only PASSED ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay registry+scanner with token STANDARD_OUT 05:13:05 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Quay registry and scanner supports token and/or robot credentials - quay registry+scanner with token 05:13:05 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 13035599-58b7-43d2-b963-70084d68f1dd 05:13:06 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: quay 05:13:07 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: quay: 7daa8103-c9f7-4724-9f6a-f3839e648dfa 05:13:07 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: quay: 7daa8103-c9f7-4724-9f6a-f3839e648dfa 05:13:09 | INFO | ImageScanningTest | BaseSpecification | Adding core image registry integration 05:13:09 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: core quay 05:13:09 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: core quay: a653edd2-4085-489e-8223-ce7f0d79439b 05:13:09 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: core quay: a653edd2-4085-489e-8223-ce7f0d79439b 05:13:09 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:13:09 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 7daa8103-c9f7-4724-9f6a-f3839e648dfa 05:13:09 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay registry+scanner with token PASSED ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay registry+scanner with token and robot creds STANDARD_OUT 05:13:09 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Quay registry and scanner supports token and/or robot credentials - quay registry+scanner with token and robot creds 05:13:09 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: a653edd2-4085-489e-8223-ce7f0d79439b 05:13:10 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: quay 05:13:10 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: quay: 8c23d4f0-a230-4a6f-807b-8c362b0343e9 05:13:10 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: quay: 8c23d4f0-a230-4a6f-807b-8c362b0343e9 05:13:11 | INFO | ImageScanningTest | BaseSpecification | Adding core image registry integration 05:13:11 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: core quay 05:13:11 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: core quay: 25bf0825-177a-4805-997a-3b32da1c82bb 05:13:11 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: core quay: 25bf0825-177a-4805-997a-3b32da1c82bb 05:13:11 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:13:11 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 8c23d4f0-a230-4a6f-807b-8c362b0343e9 05:13:11 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay registry+scanner with token and robot creds PASSED ImageScanningTest STANDARD_OUT 05:13:12 | DEBUG | ImageScanningTest | Kubernetes | Waiting for namespace qa-image-scanning-test to be deleted 05:13:12 | DEBUG | ImageScanningTest | Kubernetes | Retrying in 3... 05:13:15 | DEBUG | ImageScanningTest | Kubernetes | Retrying in 3... 05:13:18 | DEBUG | ImageScanningTest | Kubernetes | Retrying in 3... 05:13:21 | DEBUG | ImageScanningTest | Kubernetes | K8s found that namespace qa-image-scanning-test was deleted 05:13:21 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:13:21 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 1545d201-80dc-4dae-8147-def461b2ded5 05:13:21 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 1545d201-80dc-4dae-8147-def461b2ded5 05:13:21 | DEBUG | ImageScanningTest | Kubernetes | gcr-image-pull-secret: secret created. 05:13:21 | INFO | ImageScanningTest | ImageScanningTest | Ending testsuite 05:13:21 | INFO | ImageScanningTest | ImageScanningTest | Checking if cluster is healthy after test 05:13:21 | DEBUG | ImageScanningTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ImageSignatureVerificationTest STANDARD_OUT 05:13:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testsuite 05:13:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | quay: secret created. 05:13:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | public-dockerhub: secret created. 05:13:21 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Distroless: io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6 05:13:21 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Tekton: io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755 05:13:21 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Unverifiable: io.stackrox.signatureintegration.44d11d9c-9aca-4332-98a3-5a58b0841fc9 05:13:21 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Same+Digest: io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057 05:13:21 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: BYOPKI-Wildcard: io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06 05:13:21 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: BYOPKI-Matching: io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d 05:13:21 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: BYOPKI-Unverifiable: io.stackrox.signatureintegration.a43d6bb6-a190-406c-ba59-35b85f5f1866 05:13:21 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Distroless+Tekton: io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca 05:13:22 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: BOYPKI-Wildcard+Tekton: io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812 05:13:22 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Keyless-Sigstore-Matching: io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69 05:13:22 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Keyless-Sigstore-Unverifiable: io.stackrox.signatureintegration.72ec1760-f8d9-44da-bbe9-72b8681a90e8 05:13:22 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Keyless-RHTAS-Matching: io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861 05:13:22 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Keyless-RHTAS-Unverifiable: io.stackrox.signatureintegration.8157eb96-f823-4134-9af9-f0482a0c7215 05:13:22 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:13:22 | DEBUG | ImageSignatureVerificatio | OpenShift | Adding system:serviceaccount:qa-signature-tests:default to anyuid user list 05:13:22 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace with-signature-verified-by-distroless 05:13:22 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:13:22 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace with-signature-verified-by-tekton 05:13:22 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:13:22 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace with-signature-unverifiable 05:13:22 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:13:22 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace without-signature 05:13:22 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:13:22 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace same-digest-without-signature 05:13:22 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:13:22 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace same-digest-with-signature 05:13:22 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:13:22 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace byopki 05:13:22 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:13:22 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace keyless-sigstore 05:13:22 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:13:22 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace keyless-rhtas 05:13:22 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for with-signature-verified-by-distroless to start 05:13:22 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of with-signature-verified-by-distroless's pods: 05:13:23 | DEBUG | ImageSignatureVerificatio | Kubernetes | - with-signature-verified-by-distroless-cdc7974cb-zhkht Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:13:23 | DEBUG | ImageSignatureVerificatio | Kubernetes | 0/1 are in the ready state for with-signature-verified-by-distroless 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for with-signature-verified-by-distroless to start 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of with-signature-verified-by-distroless's pods: 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | - with-signature-verified-by-distroless-cdc7974cb-zhkht Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:13:23Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for with-signature-verified-by-distroless 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 3 seconds for k8s deployment with-signature-verified-by-distroless 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment with-signature-verified-by-distroless with 1 pods 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for with-signature-verified-by-tekton to start 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of with-signature-verified-by-tekton's pods: 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | - with-signature-verified-by-tekton-cd6f9fdfc-nn8qp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:13:23Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for with-signature-verified-by-tekton 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment with-signature-verified-by-tekton 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment with-signature-verified-by-tekton with 1 pods 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for with-signature-unverifiable to start 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of with-signature-unverifiable's pods: 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | - with-signature-unverifiable-5969d7d8c9-pjj2n Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:13:23Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for with-signature-unverifiable 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment with-signature-unverifiable 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment with-signature-unverifiable with 1 pods 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for without-signature to start 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of without-signature's pods: 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | - without-signature-5d6fd9ddb7-twf46 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:13:23Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for without-signature 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment without-signature 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment without-signature with 1 pods 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for same-digest-without-signature to start 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of same-digest-without-signature's pods: 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | - same-digest-without-signature-5654f489f6-xklvz Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:13:23Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for same-digest-without-signature 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment same-digest-without-signature 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment same-digest-without-signature with 1 pods 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for same-digest-with-signature to start 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of same-digest-with-signature's pods: 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | - same-digest-with-signature-5d5548ff99-k98xn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:13:23Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for same-digest-with-signature 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment same-digest-with-signature 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment same-digest-with-signature with 1 pods 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for byopki to start 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of byopki's pods: 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | - byopki-5bb68c6b96-szdvq Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:13:23Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for byopki 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment byopki 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment byopki with 1 pods 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for keyless-sigstore to start 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of keyless-sigstore's pods: 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | - keyless-sigstore-7fb9ffcd6f-7szhg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:13:23Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for keyless-sigstore 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment keyless-sigstore 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment keyless-sigstore with 1 pods 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for keyless-rhtas to start 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of keyless-rhtas's pods: 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | - keyless-rhtas-6b7975bc87-25rdg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:13:23Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for keyless-rhtas 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment keyless-rhtas 05:13:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment keyless-rhtas with 1 pods 05:13:26 | INFO | ImageSignatureVerificatio | Services | SR found deployment with-signature-verified-by-distroless within 0s 05:13:26 | INFO | ImageSignatureVerificatio | Services | SR found deployment with-signature-verified-by-tekton within 0s 05:13:26 | INFO | ImageSignatureVerificatio | Services | SR found deployment with-signature-unverifiable within 0s 05:13:26 | INFO | ImageSignatureVerificatio | Services | SR found deployment without-signature within 0s 05:13:26 | INFO | ImageSignatureVerificatio | Services | SR found deployment same-digest-without-signature within 0s 05:13:26 | INFO | ImageSignatureVerificatio | Services | SR found deployment same-digest-with-signature within 0s 05:13:26 | INFO | ImageSignatureVerificatio | Services | SR found deployment byopki within 0s 05:13:26 | INFO | ImageSignatureVerificatio | Services | SR found deployment keyless-sigstore within 0s 05:13:26 | INFO | ImageSignatureVerificatio | Services | SR found deployment keyless-rhtas within 0s 05:13:26 | DEBUG | ImageSignatureVerificatio | Helpers | Caught exception. Retrying in 30s (attempt 0 of 20): io.grpc.StatusRuntimeException: NOT_FOUND: image with id "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6" does not exist: not found ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'byopki' STANDARD_OUT 05:13:58 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'byopki' 05:13:58 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:13:58 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:13:58 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:13:58 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:13:58 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'with-signature-verified-by-distroless' 05:13:58 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:13:58 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless - additional 2 consecutive checks required 05:14:01 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:01 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless - additional 1 consecutive checks required 05:14:04 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:04 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless after waiting 6 seconds 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'keyless-rhtas' STANDARD_OUT 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'keyless-rhtas' 05:14:04 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:04 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:14:04 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'keyless-sigstore' STANDARD_OUT 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'keyless-sigstore' 05:14:04 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:04 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:14:04 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'same-digest-without-signature' STANDARD_OUT 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'same-digest-without-signature' 05:14:04 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:04 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:14:04 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'same-digest-with-signature' STANDARD_OUT 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'same-digest-with-signature' 05:14:04 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:04 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:14:04 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'with-signature-verified-by-tekton' 05:14:04 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:04 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:04 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'with-signature-unverifiable' 05:14:04 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:04 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:14:04 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'without-signature' STANDARD_OUT 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'without-signature' 05:14:04 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:04 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:14:04 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'byopki' STANDARD_OUT 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'byopki' 05:14:04 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:04 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:04 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'with-signature-verified-by-distroless' 05:14:04 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:04 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:04 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'keyless-rhtas' STANDARD_OUT 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'keyless-rhtas' 05:14:04 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:04 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:04 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'keyless-sigstore' STANDARD_OUT 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'keyless-sigstore' 05:14:04 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:04 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:04 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'same-digest-without-signature' STANDARD_OUT 05:14:04 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'same-digest-without-signature' 05:14:05 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:05 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:05 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:14:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'same-digest-with-signature' STANDARD_OUT 05:14:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'same-digest-with-signature' 05:14:05 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:05 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:05 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:14:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:14:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'with-signature-verified-by-tekton' 05:14:05 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:05 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Tekton - additional 2 consecutive checks required 05:14:08 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:08 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Tekton - additional 1 consecutive checks required 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Tekton after waiting 6 seconds 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'with-signature-unverifiable' 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:11 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'without-signature' STANDARD_OUT 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'without-signature' 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:11 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'byopki' STANDARD_OUT 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'byopki' 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:11 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'with-signature-verified-by-distroless' 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:11 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'keyless-rhtas' STANDARD_OUT 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'keyless-rhtas' 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:11 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'keyless-sigstore' STANDARD_OUT 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'keyless-sigstore' 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:11 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'same-digest-without-signature' STANDARD_OUT 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'same-digest-without-signature' 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:11 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'same-digest-with-signature' STANDARD_OUT 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'same-digest-with-signature' 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:11 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'with-signature-verified-by-tekton' 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:11 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'with-signature-unverifiable' 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:11 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'without-signature' STANDARD_OUT 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'without-signature' 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:11 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'byopki' STANDARD_OUT 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'byopki' 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:14:11 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:14:11 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-verified-by-distroless' 05:14:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:11 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless+Tekton - additional 2 consecutive checks required 05:14:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:14 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless+Tekton - additional 1 consecutive checks required 05:14:17 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:17 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless+Tekton after waiting 6 seconds 05:14:17 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'keyless-rhtas' STANDARD_OUT 05:14:17 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'keyless-rhtas' 05:14:17 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:17 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:14:17 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:14:17 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'keyless-sigstore' STANDARD_OUT 05:14:17 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'keyless-sigstore' 05:14:17 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:17 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:14:17 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:14:17 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'same-digest-without-signature' STANDARD_OUT 05:14:17 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'same-digest-without-signature' 05:14:17 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:17 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:14:17 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:14:17 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'same-digest-with-signature' STANDARD_OUT 05:14:17 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'same-digest-with-signature' 05:14:17 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:17 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:14:17 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:14:17 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:14:17 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-verified-by-tekton' 05:14:17 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:17 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Distroless+Tekton - additional 2 consecutive checks required 05:14:20 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:20 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Distroless+Tekton - additional 1 consecutive checks required 05:14:23 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:23 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Distroless+Tekton after waiting 6 seconds 05:14:23 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:14:23 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-unverifiable' 05:14:23 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:23 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:14:23 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:14:23 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'without-signature' STANDARD_OUT 05:14:23 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'without-signature' 05:14:23 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:23 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:14:23 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:14:23 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'byopki' STANDARD_OUT 05:14:23 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'byopki' 05:14:23 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:23 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:23 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:14:23 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:14:23 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-verified-by-distroless' 05:14:23 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:23 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless+Tekton+Unverifiable - additional 2 consecutive checks required 05:14:26 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:27 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless+Tekton+Unverifiable - additional 1 consecutive checks required 05:14:30 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:30 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless+Tekton+Unverifiable after waiting 6 seconds 05:14:30 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'keyless-rhtas' STANDARD_OUT 05:14:30 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'keyless-rhtas' 05:14:30 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:30 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:30 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:14:30 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'keyless-sigstore' STANDARD_OUT 05:14:30 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'keyless-sigstore' 05:14:30 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:30 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:30 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:14:30 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'same-digest-without-signature' STANDARD_OUT 05:14:30 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'same-digest-without-signature' 05:14:30 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:30 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:30 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:14:30 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'same-digest-with-signature' STANDARD_OUT 05:14:30 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'same-digest-with-signature' 05:14:30 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:30 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:30 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:14:30 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:14:30 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-verified-by-tekton' 05:14:30 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:30 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Distroless+Tekton+Unverifiable - additional 2 consecutive checks required 05:14:33 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:33 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Distroless+Tekton+Unverifiable - additional 1 consecutive checks required 05:14:36 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:36 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Distroless+Tekton+Unverifiable after waiting 6 seconds 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-unverifiable' 05:14:36 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:36 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:36 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'without-signature' STANDARD_OUT 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'without-signature' 05:14:36 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:36 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:36 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'byopki' STANDARD_OUT 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'byopki' 05:14:36 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:36 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:36 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'with-signature-verified-by-distroless' 05:14:36 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:36 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:36 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'keyless-rhtas' STANDARD_OUT 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'keyless-rhtas' 05:14:36 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:36 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:36 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'keyless-sigstore' STANDARD_OUT 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'keyless-sigstore' 05:14:36 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:36 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:36 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'same-digest-without-signature' STANDARD_OUT 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'same-digest-without-signature' 05:14:36 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:36 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:36 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'same-digest-with-signature' STANDARD_OUT 05:14:36 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'same-digest-with-signature' 05:14:36 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:36 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment same-digest-with-signature and policy Same+Digest - additional 2 consecutive checks required 05:14:39 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:39 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment same-digest-with-signature and policy Same+Digest - additional 1 consecutive checks required 05:14:42 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:42 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment same-digest-with-signature and policy Same+Digest after waiting 6 seconds 05:14:42 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:14:42 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'with-signature-verified-by-tekton' 05:14:42 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:42 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:42 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:14:42 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:14:42 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'with-signature-unverifiable' 05:14:42 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:42 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:42 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:14:42 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'without-signature' STANDARD_OUT 05:14:42 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'without-signature' 05:14:42 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:42 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:42 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:14:42 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'byopki' STANDARD_OUT 05:14:42 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'byopki' 05:14:42 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:42 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BYOPKI-Wildcard - additional 2 consecutive checks required 05:14:45 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:45 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BYOPKI-Wildcard - additional 1 consecutive checks required 05:14:48 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:48 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BYOPKI-Wildcard after waiting 6 seconds 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-verified-by-distroless' 05:14:48 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:48 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:48 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'keyless-rhtas' STANDARD_OUT 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'keyless-rhtas' 05:14:48 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:48 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:48 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'keyless-sigstore' STANDARD_OUT 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'keyless-sigstore' 05:14:48 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:48 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:48 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'same-digest-without-signature' STANDARD_OUT 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'same-digest-without-signature' 05:14:48 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:48 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:48 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'same-digest-with-signature' STANDARD_OUT 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'same-digest-with-signature' 05:14:48 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:48 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:48 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-verified-by-tekton' 05:14:48 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:48 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:48 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:14:48 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-unverifiable' 05:14:48 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:49 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:49 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:14:49 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'without-signature' STANDARD_OUT 05:14:49 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'without-signature' 05:14:49 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:49 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:49 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:14:49 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'byopki' STANDARD_OUT 05:14:49 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'byopki' 05:14:49 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:49 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BYOPKI-Matching - additional 2 consecutive checks required 05:14:52 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:52 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BYOPKI-Matching - additional 1 consecutive checks required 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BYOPKI-Matching after waiting 6 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-verified-by-distroless' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'keyless-rhtas' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'keyless-rhtas' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'keyless-sigstore' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'keyless-sigstore' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'same-digest-without-signature' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'same-digest-without-signature' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'same-digest-with-signature' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'same-digest-with-signature' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-verified-by-tekton' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-unverifiable' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'without-signature' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'without-signature' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'byopki' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'byopki' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-verified-by-distroless' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'keyless-rhtas' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'keyless-rhtas' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'keyless-sigstore' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'keyless-sigstore' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'same-digest-without-signature' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'same-digest-without-signature' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'same-digest-with-signature' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'same-digest-with-signature' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-verified-by-tekton' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-unverifiable' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'without-signature' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'without-signature' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:14:55 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'byopki' STANDARD_OUT 05:14:55 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'byopki' 05:14:55 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:55 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BOYPKI-Wildcard+Tekton - additional 2 consecutive checks required 05:14:58 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:58 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BOYPKI-Wildcard+Tekton - additional 1 consecutive checks required 05:15:01 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:01 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BOYPKI-Wildcard+Tekton after waiting 6 seconds 05:15:01 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:15:01 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-verified-by-distroless' 05:15:01 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:01 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:01 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:15:01 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'keyless-rhtas' STANDARD_OUT 05:15:01 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'keyless-rhtas' 05:15:01 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:01 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:01 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:15:01 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'keyless-sigstore' STANDARD_OUT 05:15:01 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'keyless-sigstore' 05:15:01 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:01 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:01 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:15:01 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'same-digest-without-signature' STANDARD_OUT 05:15:01 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'same-digest-without-signature' 05:15:01 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:01 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:01 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:15:01 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'same-digest-with-signature' STANDARD_OUT 05:15:01 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'same-digest-with-signature' 05:15:01 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:02 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:02 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:15:02 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:15:02 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-verified-by-tekton' 05:15:02 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:02 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy BOYPKI-Wildcard+Tekton - additional 2 consecutive checks required 05:15:05 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:05 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy BOYPKI-Wildcard+Tekton - additional 1 consecutive checks required 05:15:08 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:08 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy BOYPKI-Wildcard+Tekton after waiting 6 seconds 05:15:08 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:15:08 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-unverifiable' 05:15:08 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:08 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:08 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:15:08 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'without-signature' STANDARD_OUT 05:15:08 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'without-signature' 05:15:08 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:08 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:08 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:15:08 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'byopki' STANDARD_OUT 05:15:08 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'byopki' 05:15:08 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:08 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:08 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:15:08 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:15:08 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-verified-by-distroless' 05:15:08 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:08 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:08 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:15:08 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'keyless-rhtas' STANDARD_OUT 05:15:08 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'keyless-rhtas' 05:15:08 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:08 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:08 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:15:08 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'keyless-sigstore' STANDARD_OUT 05:15:08 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'keyless-sigstore' 05:15:08 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:08 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment keyless-sigstore and policy Keyless-Sigstore-Matching - additional 2 consecutive checks required 05:15:11 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:11 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment keyless-sigstore and policy Keyless-Sigstore-Matching - additional 1 consecutive checks required 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment keyless-sigstore and policy Keyless-Sigstore-Matching after waiting 6 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'same-digest-without-signature' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'same-digest-without-signature' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'same-digest-with-signature' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'same-digest-with-signature' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-verified-by-tekton' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-unverifiable' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'without-signature' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'without-signature' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'byopki' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'byopki' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-verified-by-distroless' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'keyless-rhtas' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'keyless-rhtas' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'keyless-sigstore' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'keyless-sigstore' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'same-digest-without-signature' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'same-digest-without-signature' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'same-digest-with-signature' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'same-digest-with-signature' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-verified-by-tekton' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-unverifiable' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'without-signature' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'without-signature' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'byopki' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'byopki' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-verified-by-distroless' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:14 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'keyless-rhtas' STANDARD_OUT 05:15:14 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'keyless-rhtas' 05:15:14 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:14 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment keyless-rhtas and policy Keyless-RHTAS-Matching - additional 2 consecutive checks required 05:15:17 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:17 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment keyless-rhtas and policy Keyless-RHTAS-Matching - additional 1 consecutive checks required 05:15:20 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:20 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment keyless-rhtas and policy Keyless-RHTAS-Matching after waiting 6 seconds 05:15:20 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'keyless-sigstore' STANDARD_OUT 05:15:20 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'keyless-sigstore' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'same-digest-without-signature' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'same-digest-without-signature' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'same-digest-with-signature' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'same-digest-with-signature' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-verified-by-tekton' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-unverifiable' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'without-signature' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'without-signature' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'byopki' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'byopki' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-verified-by-distroless' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'keyless-rhtas' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'keyless-rhtas' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'keyless-sigstore' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'keyless-sigstore' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'same-digest-without-signature' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'same-digest-without-signature' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'same-digest-with-signature' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'same-digest-with-signature' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-verified-by-tekton' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-unverifiable' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'without-signature' STANDARD_OUT 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'without-signature' 05:15:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:21 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:15:21 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:15:21 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'without-signature' PASSED ImageSignatureVerificationTest STANDARD_OUT 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: with-signature-verified-by-distroless 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | with-signature-verified-by-distroless: deployment removed. 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: with-signature-verified-by-tekton 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | with-signature-verified-by-tekton: deployment removed. 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: with-signature-unverifiable 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | with-signature-unverifiable: deployment removed. 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: without-signature 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | without-signature: deployment removed. 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: same-digest-without-signature 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | same-digest-without-signature: deployment removed. 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: same-digest-with-signature 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | same-digest-with-signature: deployment removed. 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: byopki 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | byopki: deployment removed. 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: keyless-sigstore 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | keyless-sigstore: deployment removed. 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: keyless-rhtas 05:15:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | keyless-rhtas: deployment removed. 05:15:22 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6 05:15:23 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755 05:15:23 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.44d11d9c-9aca-4332-98a3-5a58b0841fc9 05:15:23 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057 05:15:23 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06 05:15:23 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d 05:15:23 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.a43d6bb6-a190-406c-ba59-35b85f5f1866 05:15:23 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca 05:15:23 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812 05:15:23 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69 05:15:23 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.72ec1760-f8d9-44da-bbe9-72b8681a90e8 05:15:23 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861 05:15:23 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.8157eb96-f823-4134-9af9-f0482a0c7215 05:15:23 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for namespace qa-signature-tests to be deleted 05:15:23 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:15:26 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:15:29 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:15:32 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:15:35 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:15:38 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:15:41 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:15:44 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:15:48 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:15:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:15:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:15:57 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:16:00 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:16:03 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:16:06 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:16:09 | DEBUG | ImageSignatureVerificatio | Kubernetes | K8s found that namespace qa-signature-tests was deleted 05:16:09 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for namespace qa-signature-tests to be deleted 05:16:09 | DEBUG | ImageSignatureVerificatio | Kubernetes | K8s found that namespace qa-signature-tests was deleted 05:16:09 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testsuite 05:16:09 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Checking if cluster is healthy after test 05:16:09 | DEBUG | ImageSignatureVerificatio | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries IntegrationHealthTest STANDARD_OUT 05:16:09 | INFO | IntegrationHealthTest | IntegrationHealthTest | Starting testsuite IntegrationHealthTest > Verify vulnerability definitions information is available STANDARD_OUT 05:16:09 | INFO | IntegrationHealthTest | IntegrationHealthTest | Starting testcase: Verify vulnerability definitions information is available 05:16:09 | INFO | IntegrationHealthTest | IntegrationHealthTest | Ending testcase IntegrationHealthTest > Verify vulnerability definitions information is available PASSED IntegrationHealthTest STANDARD_OUT 05:16:09 | INFO | IntegrationHealthTest | IntegrationHealthTest | Ending testsuite 05:16:09 | INFO | IntegrationHealthTest | IntegrationHealthTest | Checking if cluster is healthy after test 05:16:09 | DEBUG | IntegrationHealthTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries IntegrationsSplunkViolationsTest STANDARD_OUT 05:16:09 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Starting testsuite 05:16:09 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Waiting for namespace qa-splunk to be deleted 05:16:09 | DEBUG | IntegrationsSplunkViolati | Kubernetes | K8s found that namespace qa-splunk was deleted 05:16:09 | INFO | IntegrationsSplunkViolati | OpenShift | Created namespace qa-splunk 05:16:09 | INFO | IntegrationsSplunkViolati | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-splunk namespace. 05:16:09 | DEBUG | IntegrationsSplunkViolati | Kubernetes | quay: secret created. 05:16:09 | DEBUG | IntegrationsSplunkViolati | Kubernetes | default-dockercfg-9g79g: secret created. 05:16:09 | DEBUG | IntegrationsSplunkViolati | Kubernetes | redhat-image-pull-secret: secret created. 05:16:09 | DEBUG | IntegrationsSplunkViolati | Kubernetes | public-dockerhub: secret created. 05:16:09 | DEBUG | IntegrationsSplunkViolati | Kubernetes | gcr-image-pull-secret: secret created. 05:16:09 | DEBUG | IntegrationsSplunkViolati | OpenShift | Adding system:serviceaccount:qa-splunk:default to anyuid user list 05:16:09 | DEBUG | IntegrationsSplunkViolati | Kubernetes | quay: secret created. 05:16:10 | DEBUG | IntegrationsSplunkViolati | Kubernetes | public-dockerhub: secret created. IntegrationsSplunkViolationsTest > Verify Splunk violations: StackRox violations reach Splunk TA STANDARD_OUT 05:16:10 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Starting testcase: Verify Splunk violations: StackRox violations reach Splunk TA 05:16:10 | DEBUG | IntegrationsSplunkViolati | OpenShift | Namespace qa-splunk already exists 05:16:10 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Told the orchestrator to createOrReplace splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 05:16:10 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Waiting for splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 to start 05:16:10 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Status of splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520's pods: 05:16:10 | DEBUG | IntegrationsSplunkViolati | Kubernetes | - splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv Container status: [] 05:16:10 | DEBUG | IntegrationsSplunkViolati | Kubernetes | 0/1 are in the ready state for splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 05:16:13 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Waiting for splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 to start 05:16:13 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Status of splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520's pods: 05:16:13 | DEBUG | IntegrationsSplunkViolati | Kubernetes | - splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:16:10Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:16:13 | DEBUG | IntegrationsSplunkViolati | Kubernetes | All 1 replicas found in ready state for splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 05:16:13 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Took 3 seconds for k8s deployment splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 05:16:13 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Updating deployment splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 with 1 pods 05:16:13 | DEBUG | IntegrationsSplunkViolati | Kubernetes | splunk-collector-a6b4a138-dcc6-44a8-a157-6283ef8b4520: Service created 05:16:13 | DEBUG | IntegrationsSplunkViolati | Kubernetes | splunk-syslog-a6b4a138-dcc6-44a8-a157-6283ef8b4520: Service created 05:16:13 | INFO | IntegrationsSplunkViolati | SplunkUtil | Waiting for Splunk to boot... 05:16:13 | DEBUG | IntegrationsSplunkViolati | Helpers | Caught exception. Retrying in 10s (attempt 0 of 30): javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake 05:16:23 | DEBUG | IntegrationsSplunkViolati | Helpers | Caught exception. Retrying in 10s (attempt 1 of 30): javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake 05:16:33 | DEBUG | IntegrationsSplunkViolati | Helpers | Caught exception. Retrying in 10s (attempt 2 of 30): javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake 05:16:46 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | Splunkd status: {"links":{},"origin":"https://127.0.0.1:37767/services/server/health","updated":"2025-10-31T05:16:46+00:00","generator":{"build":"e9494146ae5c","version":"9.0.5"},"entry":[{"name":"splunkd","id":"https://127.0.0.1:37767/services/server/health/splunkd","updated":"1970-01-01T00:00:00+00:00","links":{"alternate":"/services/server/health/splunkd","list":"/services/server/health/splunkd"},"author":"system","acl":{"app":"","can_list":true,"can_write":true,"modifiable":false,"owner":"system","perms":{"read":["admin","splunk-system-role"],"write":[]},"removable":false,"sharing":"system"},"content":{"eai:acl":null,"features":{"File Monitor Input":{"features":{"Forwarder Ingestion Latency":{"health":"green"},"Ingestion Latency":{"health":"green"},"Large and Archive File Reader-0":{"health":"green"},"Real-time Reader-0":{"health":"green"}},"health":"green"},"Index Processor":{"features":{"Buckets":{"health":"green"},"Disk Space":{"health":"green"},"Index Optimization":{"health":"green"}},"health":"green"},"Search Scheduler":{"features":{"Scheduler Suppression":{"health":"green"},"Search Lag":{"health":"green"},"Searches Delayed":{"health":"green"},"Searches Skipped in the last 24 hours":{"health":"green"}},"health":"green"},"Workload Management":{"disabled":true,"health":"green"}},"health":"green"}}],"paging":{"total":1,"perPage":30,"offset":0},"messages":[]} 05:16:47 | INFO | IntegrationsSplunkViolati | SplunkUtil | Splunk has completed booting 05:16:47 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Starting Splunk TA configuration 05:16:47 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Copying TA and CIM app files to splunk pod 05:16:47 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Installing TA 05:16:50 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Installing CIM app 05:16:50 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv is running 05:16:50 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv: [sudo, /opt/splunk/bin/splunk, set, minfreemb, 200, -auth, admin:helloworld] 05:16:51 | DEBUG | | Kubernetes | Command exited with 0 05:16:51 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:16:51 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: SUCCESS Stdout: You need to restart the Splunk Server (splunkd) for your changes to take effect. Stderr: sudo: unable to send audit message: Operation not permitted WARNING: Server Certificate Hostname Validation is disabled. Please see server.conf/[sslConfig]/cliVerifyServerName for details. 05:16:51 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Restarting Splunk to apply settings and TA 05:16:58 | DEBUG | IntegrationsSplunkViolati | Helpers | Caught exception. Retrying in 30s (attempt 0 of 20): org.apache.http.NoHttpResponseException: localhost:37767 failed to respond 05:17:34 | INFO | IntegrationsSplunkViolati | SplunkUtil | Waiting for Splunk to boot... 05:17:34 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | Splunkd status: {"links":{},"origin":"https://127.0.0.1:37767/services/server/health","updated":"2025-10-31T05:17:34+00:00","generator":{"build":"e9494146ae5c","version":"9.0.5"},"entry":[{"name":"splunkd","id":"https://127.0.0.1:37767/services/server/health/splunkd","updated":"1970-01-01T00:00:00+00:00","links":{"alternate":"/services/server/health/splunkd","list":"/services/server/health/splunkd"},"author":"system","acl":{"app":"","can_list":true,"can_write":true,"modifiable":false,"owner":"system","perms":{"read":["admin","splunk-system-role"],"write":[]},"removable":false,"sharing":"system"},"content":{"eai:acl":null,"features":{"File Monitor Input":{"features":{"Forwarder Ingestion Latency":{"health":"green"},"Ingestion Latency":{"health":"green"},"Large and Archive File Reader-0":{"health":"green"},"Real-time Reader-0":{"health":"green"}},"health":"green"},"Index Processor":{"features":{"Buckets":{"health":"green"},"Disk Space":{"health":"green"},"Index Optimization":{"health":"green"}},"health":"green"},"Search Scheduler":{"features":{"Scheduler Suppression":{"health":"green"},"Search Lag":{"health":"green"},"Searches Delayed":{"health":"green"},"Searches Skipped in the last 24 hours":{"health":"green"}},"health":"green"},"Workload Management":{"disabled":true,"health":"green"}},"health":"green"}}],"paging":{"total":1,"perPage":30,"offset":0},"messages":[]} 05:17:34 | INFO | IntegrationsSplunkViolati | SplunkUtil | Splunk has completed booting 05:17:34 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Configuring Stackrox TA 05:17:35 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv is running 05:17:35 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv: [curl, http://127.0.0.1:10248/, --max-time, 2] 05:17:35 | DEBUG | | Kubernetes | Command exited with 7 05:17:35 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:17:35 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: FAILURE Stdout: Stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0curl: (7) Failed to connect to 127.0.0.1 port 10248: Connection refused 05:17:35 | DEBUG | IntegrationsSplunkViolati | Helpers | Calling services.AlertService.getViolations with 3 retries 05:17:35 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv is running 05:17:35 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv: [curl, --insecure, --head, --request, GET, --max-time, 5, https://172.30.45.18:443] 05:17:35 | DEBUG | | Kubernetes | Command exited with 0 05:17:35 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:17:35 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: SUCCESS Stdout: HTTP/2 200 accept-ranges: bytes cache-control: no-store, no-cache content-security-policy: frame-ancestors 'self' content-type: text/html; charset=utf-8 last-modified: Fri, 31 Oct 2025 01:26:42 GMT strict-transport-security: max-age=31536000; includeSubDomains vary: Accept-Encoding x-content-type-options: nosniff x-frame-options: sameorigin x-xss-protection: 1; mode=block content-length: 1869 date: Fri, 31 Oct 2025 05:17:35 GMT Stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 1869 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 05:17:35 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:35 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:37 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:37 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:38 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:38 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:39 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:39 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:41 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:41 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:42 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:42 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:43 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:43 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:44 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:44 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:45 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:45 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:46 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:46 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:47 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:47 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:48 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:48 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:49 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:49 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:50 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:50 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:51 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:51 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:52 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:52 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:53 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:53 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:54 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:54 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:55 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:55 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:56 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:56 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:57 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:57 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:17:58 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:17:58 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:00 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:00 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:01 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:01 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:02 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:02 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:03 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:03 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:04 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:04 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:05 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:05 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:06 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:06 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:07 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:07 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:08 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:08 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:09 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:09 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:10 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:10 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:11 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:11 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:12 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:12 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:13 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:13 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:14 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:14 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Source Id 84f0382b-0e6d-4122-9fe3-2f02374c8f60 -> edge target key: 3 05:18:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> targetId: ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 05:18:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1761887855.886720000 05:18:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Found source 84f0382b-0e6d-4122-9fe3-2f02374c8f60 -> target null in graph after 39.85s 05:18:15 | DEBUG | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Network baseline before lock call: deployment_id: "84f0382b-0e6d-4122-9fe3-2f02374c8f60" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-splunk" peers { entity { info { type: DEPLOYMENT id: "ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0" deployment { name: "central" } } } properties { port: 8443 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761887890 nanos: 232156000 } deployment_name: "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520" 05:18:15 | DEBUG | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Network baseline after lock call: deployment_id: "84f0382b-0e6d-4122-9fe3-2f02374c8f60" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-splunk" peers { entity { info { type: DEPLOYMENT id: "ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0" deployment { name: "central" } } } properties { port: 8443 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761887890 nanos: 232156000 } locked: true deployment_name: "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520" 05:18:15 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv is running 05:18:15 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv: [curl, --insecure, --head, --request, GET, --max-time, 5, https://172.30.0.1:443] 05:18:15 | DEBUG | | Kubernetes | Command exited with 0 05:18:15 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:18:15 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: SUCCESS Stdout: HTTP/2 403 audit-id: 6dfc48d9-b0a7-4ada-a1c5-54f04b307070 cache-control: no-cache, private content-type: application/json strict-transport-security: max-age=31536000; includeSubDomains; preload x-content-type-options: nosniff x-kubernetes-pf-flowschema-uid: 8cd70547-0f97-4305-a443-a56ae9ff984b x-kubernetes-pf-prioritylevel-uid: 2a26642e-537b-49f9-8233-178cda9ec67d content-length: 217 date: Fri, 31 Oct 2025 05:18:15 GMT Stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 217 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 05:18:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Source Id 84f0382b-0e6d-4122-9fe3-2f02374c8f60 -> edge target key: 3 05:18:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> targetId: ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 05:18:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1761887855.886720000 05:18:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Found source 84f0382b-0e6d-4122-9fe3-2f02374c8f60 -> target null in graph after 0.045s 05:18:26 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv is running 05:18:26 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv: [curl, --insecure, --head, --request, GET, --max-time, 5, https://172.30.0.1:443] 05:18:26 | DEBUG | | Kubernetes | Command exited with 0 05:18:26 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:18:26 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: SUCCESS Stdout: HTTP/2 403 audit-id: 6dfa05c1-d601-4e2b-a9f8-95047146b99e cache-control: no-cache, private content-type: application/json strict-transport-security: max-age=31536000; includeSubDomains; preload x-content-type-options: nosniff x-kubernetes-pf-flowschema-uid: 8cd70547-0f97-4305-a443-a56ae9ff984b x-kubernetes-pf-prioritylevel-uid: 2a26642e-537b-49f9-8233-178cda9ec67d content-length: 217 date: Fri, 31 Oct 2025 05:18:26 GMT Stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 217 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 05:18:26 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:26 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:26 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Source Id 84f0382b-0e6d-4122-9fe3-2f02374c8f60 -> edge target key: 3 05:18:26 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> targetId: ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 05:18:26 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1761887855.886720000 05:18:26 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Found source 84f0382b-0e6d-4122-9fe3-2f02374c8f60 -> target null in graph after 0.047s 05:18:36 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv is running 05:18:36 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv: [curl, --insecure, --head, --request, GET, --max-time, 5, https://172.30.0.1:443] 05:18:36 | DEBUG | | Kubernetes | Command exited with 0 05:18:36 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:18:36 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: SUCCESS Stdout: HTTP/2 403 audit-id: 1b31f949-74af-47fb-be75-7f130d10640f cache-control: no-cache, private content-type: application/json strict-transport-security: max-age=31536000; includeSubDomains; preload x-content-type-options: nosniff x-kubernetes-pf-flowschema-uid: 8cd70547-0f97-4305-a443-a56ae9ff984b x-kubernetes-pf-prioritylevel-uid: 2a26642e-537b-49f9-8233-178cda9ec67d content-length: 217 date: Fri, 31 Oct 2025 05:18:36 GMT Stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 217 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 05:18:36 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:36 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:36 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Source Id 84f0382b-0e6d-4122-9fe3-2f02374c8f60 -> edge target key: 3 05:18:36 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> targetId: ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 05:18:36 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1761887855.886720000 05:18:36 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Found source 84f0382b-0e6d-4122-9fe3-2f02374c8f60 -> target null in graph after 0.045s 05:18:46 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv is running 05:18:46 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv: [curl, --insecure, --head, --request, GET, --max-time, 5, https://172.30.0.1:443] 05:18:46 | DEBUG | | Kubernetes | Command exited with 0 05:18:46 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:18:46 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: SUCCESS Stdout: HTTP/2 403 audit-id: 5025782c-f9f5-43a3-98f6-dfc45e111fc8 cache-control: no-cache, private content-type: application/json strict-transport-security: max-age=31536000; includeSubDomains; preload x-content-type-options: nosniff x-kubernetes-pf-flowschema-uid: 8cd70547-0f97-4305-a443-a56ae9ff984b x-kubernetes-pf-prioritylevel-uid: 2a26642e-537b-49f9-8233-178cda9ec67d content-length: 217 date: Fri, 31 Oct 2025 05:18:46 GMT Stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 217 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 05:18:46 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 84f0382b-0e6d-4122-9fe3-2f02374c8f60, targetId null 05:18:46 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:18:46 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Source Id 84f0382b-0e6d-4122-9fe3-2f02374c8f60 -> edge target key: 3 05:18:46 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> targetId: ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 05:18:46 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1761887926.492625622 05:18:46 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Source Id 84f0382b-0e6d-4122-9fe3-2f02374c8f60 -> edge target key: 143 05:18:46 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> targetId: ada12424-bde3-4313-b810-bb463cbe8f90 05:18:46 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1761887926.492528529 05:18:46 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Found source 84f0382b-0e6d-4122-9fe3-2f02374c8f60 -> target null in graph after 0.044s 05:18:46 | DEBUG | IntegrationsSplunkViolati | Helpers | Calling services.AlertService.getViolations with 3 retries 05:18:46 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | {"sid":"1761887926.2"} 05:18:46 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | New Search created: 1761887926.2 05:19:03 | DEBUG | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Violations currently indexed in Splunk: [[_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220753, _indextime:1761887917, _raw:{"violationInfo": {"violationId": "3ffcf6be-cc03-59cf-b418-fe0b3d4ba58e", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:18:26.065535503Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:0, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.065535, _time:2025-10-31T05:18:26.065+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220675, _indextime:1761887908, _raw:{"violationInfo": {"violationId": "a90fcdb6-2c56-5242-97ea-a8bd25040b14", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:18:15.891622255Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:1, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.891622, _time:2025-10-31T05:18:15.891+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207714, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "132284b3-298a-59bd-aa1a-a4937117de8a", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.45.18:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.45.18:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:35.842454290Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:2, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.842454, _time:2025-10-31T05:17:35.842+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:63611, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "1619f084-0452-43f4-9b6d-46f6c65c6cc9", "violationMessage": "Binary '/usr/bin/curl' executed with arguments 'http://127.0.0.1:10248/ --max-time 2' under user ID 999", "violationType": "PROCESS_EVENT", "violationTime": "2025-10-31T05:17:35.678145616Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "podUid": "a62bc938-104d-5898-a4a0-8b068136b6c1", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "containerStartTime": "2025-10-31T05:16:10Z", "containerId": "af8a0cf14aa1"}, "alertInfo": {"alertId": "4cecd7a7-9648-41ff-af96-53cd925c792d", "lifecycleStage": "RUNTIME"}, "processInfo": {"processViolationId": "1619f084-0452-43f4-9b6d-46f6c65c6cc9", "processSignalId": "e9391246-b618-11f0-bf6b-0a580a830018", "processCreationTime": "2025-10-31T05:17:35.678145616Z", "processName": "curl", "processArgs": "http://127.0.0.1:10248/ --max-time 2", "execFilePath": "/usr/bin/curl", "pid": 61724, "processUid": 999, "processGid": 999}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "86804b96-e87e-4eae-b56e-1718a8a55763", "policyName": "Process Targeting Cluster Kubelet Endpoint", "policyDescription": "Detects misuse of the healthz/kubelet API/heapster endpoint", "policyRationale": "A pod communicating to a Kubernetes API from via command line is highly irregular", "policyCategories": ["Kubernetes"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:3, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.678145, _time:2025-10-31T05:17:35.678+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207792, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "3efc8639-7a67-500e-9491-8be447b608e5", "violationMessage": "Kubernetes API received exec 'curl http://127.0.0.1:10248/ --max-time 2' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl http://127.0.0.1:10248/ --max-time 2"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:35.659398286Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:4, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.659398, _time:2025-10-31T05:17:35.659+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:36943, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "3e59f7db-8bcf-5074-ab43-bd126aa9c273", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:35.020466225Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:5, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.020466, _time:2025-10-31T05:17:35.020+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37010, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "20676a69-5fcf-5299-954d-f633bde47494", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:34.838842722Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:6, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.838842, _time:2025-10-31T05:17:34.838+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37077, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "06df3370-942f-5874-8618-c1444f7b2a15", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:34.516430442Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:7, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.516430, _time:2025-10-31T05:17:34.516+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37144, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "120ddd13-2c61-58b9-a141-cf7b7191fe4d", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:28.144163920Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:8, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.144163, _time:2025-10-31T05:17:28.144+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37211, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b9329827-692a-5d3f-b327-df4126488749", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:51.999322190Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:9, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.999322, _time:2025-10-31T05:16:51.999+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207868, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a14dcc58-e481-5ed9-ae9b-a37990042f44", "violationMessage": "Kubernetes API received exec 'sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:51.044484644Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:10, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.044484, _time:2025-10-31T05:16:51.044+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37278, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "7fc2eb95-80ea-52c6-8a25-3d611f6fba00", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:50.087513492Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:11, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.087513, _time:2025-10-31T05:16:50.087+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37345, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "4c48b481-4f8b-5dfb-8790-d551f6530d1b", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.972332890Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:12, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.972332, _time:2025-10-31T05:16:47.972+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207946, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "5a9fd142-5975-5c2f-a769-d36341ab0132", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; exit $e' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; exit $e"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.869826793Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:13, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.869826, _time:2025-10-31T05:16:47.869+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208030, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "38c63ecd-1936-5897-9712-10c7e86044c2", "violationMessage": "Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar'' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar'"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.765808014Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:14, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.765808, _time:2025-10-31T05:16:47.765+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208108, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "3c492b4f-fee8-5cc5-96bf-247f55eb08e8", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar' && echo $?' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar' && echo $?"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.590607395Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:15, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.590607, _time:2025-10-31T05:16:47.590+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208188, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "88aae80b-5d66-5f94-95b3-2f22ce1d8b90", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; exit $e' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; exit $e"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.489204126Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:16, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.489204, _time:2025-10-31T05:16:47.489+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208272, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "3f6c6501-f181-5fa7-8dd4-122e994b2598", "violationMessage": "Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar'' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar'"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.392649860Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:17, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.392649, _time:2025-10-31T05:16:47.392+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208350, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "c0d38ef6-ebf9-5ede-b41f-f80c5aa79262", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar' && echo $?' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar' && echo $?"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.150668427Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:18, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.150668, _time:2025-10-31T05:16:47.150+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37412, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "85775d08-f0a6-5e74-8217-9de6c7c6fbda", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:43.804403445Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:19, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.804403, _time:2025-10-31T05:16:43.804+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37479, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "0fcf88e1-5928-520e-ac62-d310e9271350", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:33.707458371Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:20, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.707458, _time:2025-10-31T05:16:33.707+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:107431, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "82f66213-cb0d-438c-ba00-7ca5478dc515", "violationMessage": "Container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' allows privilege escalation", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070429425Z"}, "alertInfo": {"alertId": "82f66213-cb0d-438c-ba00-7ca5478dc515", "alertFirstOccurred": "2025-10-31T05:16:32.070429425Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "16c95922-08c4-41b6-a721-dc4b2a806632", "policyName": "Container with privilege escalation allowed", "policyDescription": "Alerts if a deployment has containers with allowPrivilegeEscalation set to true in its security context.", "policyRationale": "A container process can run with more privileges than its parent process if the container's security context has the boolean setting allowPrivilegeEscalation enabled. In Kubernetes pods, this setting is true by default. Set the value to false if the pod is to run as a non-root user.", "policyCategories": ["Privileges", "Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:21, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070429, _time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:76745, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "5d958a3d-b274-4149-9e22-678b7ba8406d", "violationMessage": "CPU request set to 0 cores for container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'\nMemory limit set to 0 MB for container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070409464Z"}, "alertInfo": {"alertId": "5d958a3d-b274-4149-9e22-678b7ba8406d", "alertFirstOccurred": "2025-10-31T05:16:32.070409464Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "886c3c94-3a6a-4f2b-82fc-d6bf5a310840", "policyName": "No CPU request or memory limit specified", "policyDescription": "Alert on deployments that have containers without CPU request or memory limit", "policyRationale": "A container without a specified CPU request may be starved for CPU time, while a container without a specified memory limit may cause the host to become over-provisioned.", "policyCategories": ["Devops Best Practices", "Docker Cis"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:22, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070409, _time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:161215, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "be23906d-3128-43a1-8339-7c5daad85d30", "violationMessage": "Deployment mounts the service account tokens.\nNamespace has name 'qa-splunk'\nService Account is set to 'default'", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070240100Z"}, "alertInfo": {"alertId": "be23906d-3128-43a1-8339-7c5daad85d30", "alertFirstOccurred": "2025-10-31T05:16:32.070240100Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "fb8f8732-c31d-496b-8fb1-d5abe6056e27", "policyName": "Pod Service Account Token Automatically Mounted", "policyDescription": "Protect pod default service account tokens from compromise by minimizing the mounting of the default service account token to only those pods whose application requires interaction with the Kubernetes API.", "policyRationale": "By default, Kubernetes automatically provisions a service account for each pod and mounts the secret at runtime. This service account is not typically used. If this pod is compromised and the compromised user has access to the service account, the service account could be used to escalate privileges within the cluster. To reduce the likelihood of privilege escalation this service account should not be mounted by default unless the pod requires direct access to the Kubernetes API as part of the pods functionality.", "policyCategories": ["Privileges", "Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:23, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070240, _time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:9817, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "0ce2dfee-80f3-48fe-899e-3e00291c91e0", "violationMessage": "Environment variable 'SPLUNK_PASSWORD' is present in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070160968Z"}, "alertInfo": {"alertId": "0ce2dfee-80f3-48fe-899e-3e00291c91e0", "alertFirstOccurred": "2025-10-31T05:16:32.070160968Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "f4996314-c3d7-4553-803b-b24ce7febe48", "policyName": "Environment Variable Contains Secret", "policyDescription": "Alert on deployments with environment variables that contain 'SECRET'", "policyRationale": "Using secrets in environment variables may allow inspection into your secrets from the host or even through the orchestrator UI.", "policyCategories": ["Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:24, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070160, _time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:5747, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "064ae5a8-deb1-4779-b793-9da140f841a3", "violationMessage": "Container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' includes component 'microdnf' (version 3.8.0-2.el8.x86_64)\nContainer 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' includes component 'rpm' (version 4.14.3-26.el8.x86_64)", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070054845Z"}, "alertInfo": {"alertId": "064ae5a8-deb1-4779-b793-9da140f841a3", "alertFirstOccurred": "2025-10-31T05:16:32.070054845Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "f95ff08d-130a-465a-a27e-32ed1fb05555", "policyName": "Red Hat Package Manager in Image", "policyDescription": "Alert on deployments with components of the Red Hat/Fedora/CentOS package management system.", "policyRationale": "Package managers make it easier for attackers to use compromised containers, since they can easily add software.", "policyCategories": ["Security Best Practices"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "LOW_SEVERITY", "policyVersion": "1.1"}}, _serial:25, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070054, _time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:218439, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "fd02d1e5-c03d-42b2-b1f4-a362d17bfeb5", "violationMessage": "Container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' has image created at 2023-06-03 01:21:18 (UTC)", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.069470589Z"}, "alertInfo": {"alertId": "fd02d1e5-c03d-42b2-b1f4-a362d17bfeb5", "alertFirstOccurred": "2025-10-31T05:16:32.069470589Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "2db9a279-2aec-4618-a85d-7f1bdf4911b1", "policyName": "90-Day Image Age", "policyDescription": "Alert on deployments with images that haven't been updated in 90 days", "policyRationale": "Base images are updated frequently with bug fixes and vulnerability patches. Image age exceeding 90 days may indicate a higher risk of vulnerabilities existing in the image.", "policyCategories": ["Devops Best Practices", "Security Best Practices", "Supply Chain Security"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "LOW_SEVERITY", "policyVersion": "1.1"}}, _serial:26, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.069470, _time:2025-10-31T05:16:32.069+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:140656, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a7e813dc-e164-4fa2-851b-2ddc49981d96", "violationMessage": "Fixable CVE-2019-16942 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.1\nFixable CVE-2019-16943 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.1\nFixable CVE-2019-17531 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.1\nFixable CVE-2019-20330 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.2\nFixable CVE-2020-10650 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-10672 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-10673 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-10968 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-10969 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11111 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11112 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11113 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11619 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11620 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-13949 (CVSS 7.5) (severity Important) found in component 'hive' (version 3.1.3) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 4.0.0\nFixable CVE-2020-14060 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5\nFixable CVE-2020-14061 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5\nFixable CVE-2020-14062 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5\nFixable CVE-2020-14195 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5\nFixable CVE-2020-24616 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.6\nFixable CVE-2020-24750 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.6\nFixable CVE-2020-25649 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.7\nFixable CVE-2020-35490 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-35491 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-35728 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36179 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36180 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36181 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36182 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36183 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36184 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36185 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36186 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36187 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36188 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36189 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36518 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.12.6.1\nFixable CVE-2020-8840 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.3\nFixable CVE-2020-9546 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-9547 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-9548 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2021-20190 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.7\nFixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2019.6.16) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2022.12.7\nFixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2022.9.24) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2022.12.7\nFixable CVE-2022-3171 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 3.16.3\nFixable CVE-2022-42003 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.12.7.1\nFixable CVE-2022-42004 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.12.7.1\nFixable CVE-2023-0341 (CVSS 7.8) (severity Important) found in component 'editorconfig' (version 0.12.3) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0.12.6\nFixable CVE-2023-2976 (CVSS 7.1) (severity Important) found in component 'guava' (version 11.0.2) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 32.0.0\nFixable CVE-2023-37920 (CVSS 9.8) (severity Critical) found in component 'certifi' (version 2019.6.16) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2023.7.22\nFixable CVE-2023-38325 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 41.0.2\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.12) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.26.17\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.6) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.26.17\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 2.0.2) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.0.6\nFixable CVE-2023-49083 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 41.0.6\nFixable CVE-2023-50782 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 42.0.0\nFixable CVE-2024-26130 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 42.0.4\nFixable CVE-2024-7254 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 3.25.5\nFixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.10.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.15.2\nFixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.11.2) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.15.2\nFixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 47.1.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 78.1.1\nFixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 67.8.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 78.1.1\nFixable CVE-2025-47436 (CVSS 9.8) (severity Critical) found in component 'orc' (version 1.5.8) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.8.9\nFixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-25.el8_8\nFixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-25.el8_8\nFixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.1\nFixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.1\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5837 (CVSS 7.5) (severity Important) found in component 'libnghttp2' (version 1.33.0-3.el8_2.1.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.33.0-5.el8_8\nFixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.2\nFixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.2\nFixable RHSA-2024:10379 (CVSS 7.4) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.3.1-36.el8_10\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-62.el8_10\nFixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-62.el8_10\nFixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'platform-python-setuptools' (version 39.2.0-7.el8.noarch) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:39.2.0-8.el8_10\nFixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'python3-setuptools-wheel' (version 39.2.0-7.el8.noarch) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:39.2.0-8.el8_10\nFixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-30.el8_10\nFixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-30.el8_10\nFixable RHSA-2025:10027 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.3.1-37.el8_10\nFixable RHSA-2025:10110 (CVSS 7) (severity Important) found in component 'sudo' (version 1.8.29-10.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.9.5p2-1.el8_10.1\nFixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-70.el8_10\nFixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-70.el8_10\nFixable RHSA-2025:10698 (CVSS 9.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.9.7-21.el8_10.1\nFixable RHSA-2025:12010 (CVSS 7.7) (severity Important) found in component 'sqlite-libs' (version 3.26.0-17.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.26.0-20.el8_10\nFixable RHSA-2025:12450 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.9.7-21.el8_10.2\nFixable RHSA-2025:14135 (CVSS 7.3) (severity Important) found in component 'libarchive' (version 3.3.3-5.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.3.3-6.el8_10\nFixable RHSA-2025:14557 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.3.1-38.el8_10\nFixable RHSA-2025:2686 (CVSS 8.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.9.7-19.el8_10", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.069385696Z"}, "alertInfo": {"alertId": "a7e813dc-e164-4fa2-851b-2ddc49981d96", "alertFirstOccurred": "2025-10-31T05:16:32.069385696Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "a919ccaf-6b43-4160-ac5d-a405e1440a41", "policyName": "Fixable Severity at least Important", "policyDescription": "Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important", "policyRationale": "Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s).", "policyCategories": ["Vulnerability Management"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:27, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.069385, _time:2025-10-31T05:16:32.069+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37546, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "24e469b6-67fb-56de-ada2-0f84d074195b", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:23.639385445Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:28, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.639385, _time:2025-10-31T05:16:23.639+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37613, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "75f2829a-79b8-5056-a135-a060dfb82ef8", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:13.563027882Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:29, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.563027, _time:2025-10-31T05:16:13.563+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:181394, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "d6827df1-4090-402a-a132-0d6cd44c5665", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.751223610Z"}, "alertInfo": {"alertId": "d6827df1-4090-402a-a132-0d6cd44c5665", "alertFirstOccurred": "2025-10-31T05:13:58.751223610Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:30, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.751223, _time:2025-10-31T05:13:58.751+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:134815, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a0ef76c5-1cb9-4ac7-9338-d75de5cf0128", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.526414594Z"}, "alertInfo": {"alertId": "a0ef76c5-1cb9-4ac7-9338-d75de5cf0128", "alertFirstOccurred": "2025-10-31T05:13:58.526414594Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:31, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.526414, _time:2025-10-31T05:13:58.526+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:160667, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "bcbb941b-f112-4220-8b79-fc1f2a86cbd5", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.526391463Z"}, "alertInfo": {"alertId": "bcbb941b-f112-4220-8b79-fc1f2a86cbd5", "alertFirstOccurred": "2025-10-31T05:13:58.526391463Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:32, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.526391, _time:2025-10-31T05:13:58.526+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:61662, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "4b3720ea-b24d-48a3-af7a-19189db42181", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.521906811Z"}, "alertInfo": {"alertId": "4b3720ea-b24d-48a3-af7a-19189db42181", "alertFirstOccurred": "2025-10-31T05:13:58.521906811Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:33, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.521906, _time:2025-10-31T05:13:58.521+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:150980, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b22bf77b-fbb6-4c1f-9015-60de3bc86aa3", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.521870920Z"}, "alertInfo": {"alertId": "b22bf77b-fbb6-4c1f-9015-60de3bc86aa3", "alertFirstOccurred": "2025-10-31T05:13:58.521870920Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:34, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.521870, _time:2025-10-31T05:13:58.521+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:36897, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "301f5e00-6448-4ba5-9e3e-4c4dd76d6940", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.508932907Z"}, "alertInfo": {"alertId": "301f5e00-6448-4ba5-9e3e-4c4dd76d6940", "alertFirstOccurred": "2025-10-31T05:13:58.508932907Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:35, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.508932, _time:2025-10-31T05:13:58.508+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:106546, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "81d8cc6a-5dfb-4700-bcfa-32b8f6491a9f", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.508911087Z"}, "alertInfo": {"alertId": "81d8cc6a-5dfb-4700-bcfa-32b8f6491a9f", "alertFirstOccurred": "2025-10-31T05:13:58.508911087Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:36, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.508911, _time:2025-10-31T05:13:58.508+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:72369, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "56f57eae-d48c-48b6-9c32-88a702b2039b", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.502763149Z"}, "alertInfo": {"alertId": "56f57eae-d48c-48b6-9c32-88a702b2039b", "alertFirstOccurred": "2025-10-31T05:13:58.502763149Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:37, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.502763, _time:2025-10-31T05:13:58.502+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:135171, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a144ac21-00ad-4e5f-a63f-17875fb8e557", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.502724608Z"}, "alertInfo": {"alertId": "a144ac21-00ad-4e5f-a63f-17875fb8e557", "alertFirstOccurred": "2025-10-31T05:13:58.502724608Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:38, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.502724, _time:2025-10-31T05:13:58.502+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:152598, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b387f52f-7df2-4020-8fd3-acc11115d7c1", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.495986315Z"}, "alertInfo": {"alertId": "b387f52f-7df2-4020-8fd3-acc11115d7c1", "alertFirstOccurred": "2025-10-31T05:13:58.495986315Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:39, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.495986, _time:2025-10-31T05:13:58.495+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:203113, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "ee163879-62e0-4af9-a360-5cd1719305d4", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.495973314Z"}, "alertInfo": {"alertId": "ee163879-62e0-4af9-a360-5cd1719305d4", "alertFirstOccurred": "2025-10-31T05:13:58.495973314Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:40, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.495973, _time:2025-10-31T05:13:58.495+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:95289, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "76b96af2-5b4d-4e16-a910-e8221a6d1a8d", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.495696527Z"}, "alertInfo": {"alertId": "76b96af2-5b4d-4e16-a910-e8221a6d1a8d", "alertFirstOccurred": "2025-10-31T05:13:58.495696527Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:41, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.495696, _time:2025-10-31T05:13:58.495+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:132228, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "9ec938d0-4cb9-4da0-908c-476db46cafad", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.495677136Z"}, "alertInfo": {"alertId": "9ec938d0-4cb9-4da0-908c-476db46cafad", "alertFirstOccurred": "2025-10-31T05:13:58.495677136Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:42, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.495677, _time:2025-10-31T05:13:58.495+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:205362, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "f0d4371a-b218-4343-9ca4-d7d266dd6443", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.466810139Z"}, "alertInfo": {"alertId": "f0d4371a-b218-4343-9ca4-d7d266dd6443", "alertFirstOccurred": "2025-10-31T05:13:58.466810139Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:43, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.466810, _time:2025-10-31T05:13:58.466+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:28665, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "27428ec2-09ae-4240-84ac-8fa3fb33ab53", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.466786819Z"}, "alertInfo": {"alertId": "27428ec2-09ae-4240-84ac-8fa3fb33ab53", "alertFirstOccurred": "2025-10-31T05:13:58.466786819Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:44, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.466786, _time:2025-10-31T05:13:58.466+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:192528, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "dfde9d7e-1133-4783-adfe-8143516f0f21", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.466263825Z"}, "alertInfo": {"alertId": "dfde9d7e-1133-4783-adfe-8143516f0f21", "alertFirstOccurred": "2025-10-31T05:13:58.466263825Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:45, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.466263, _time:2025-10-31T05:13:58.466+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:41295, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "33b9daaf-4573-413a-8a75-8839aa9aa474", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.466249774Z"}, "alertInfo": {"alertId": "33b9daaf-4573-413a-8a75-8839aa9aa474", "alertFirstOccurred": "2025-10-31T05:13:58.466249774Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:46, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.466249, _time:2025-10-31T05:13:58.466+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207500, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "f27a8ce8-9d36-4f07-afd8-a55b78b4b3e3", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.457620029Z"}, "alertInfo": {"alertId": "f27a8ce8-9d36-4f07-afd8-a55b78b4b3e3", "alertFirstOccurred": "2025-10-31T05:13:58.457620029Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:47, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.457620, _time:2025-10-31T05:13:58.457+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220126, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "ff4a6ee6-e43d-427b-92a4-dc3a768ddce7", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.457607209Z"}, "alertInfo": {"alertId": "ff4a6ee6-e43d-427b-92a4-dc3a768ddce7", "alertFirstOccurred": "2025-10-31T05:13:58.457607209Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:48, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.457607, _time:2025-10-31T05:13:58.457+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:120, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "0075e051-2154-4ce5-8c6b-20098e70cb2b", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.457428114Z"}, "alertInfo": {"alertId": "0075e051-2154-4ce5-8c6b-20098e70cb2b", "alertFirstOccurred": "2025-10-31T05:13:58.457428114Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:49, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.457428, _time:2025-10-31T05:13:58.457+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:13211, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "13892ab4-79c1-47de-87ec-ee6cd3d93fc4", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451767480Z"}, "alertInfo": {"alertId": "13892ab4-79c1-47de-87ec-ee6cd3d93fc4", "alertFirstOccurred": "2025-10-31T05:13:58.451767480Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:50, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451767, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:106056, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "80f21a2f-4621-4559-aa6e-c273d43abf0d", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451622786Z"}, "alertInfo": {"alertId": "80f21a2f-4621-4559-aa6e-c273d43abf0d", "alertFirstOccurred": "2025-10-31T05:13:58.451622786Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:51, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451622, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:101961, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "7bad106e-8cc0-40bc-ae04-b1449d4e138e", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451543203Z"}, "alertInfo": {"alertId": "7bad106e-8cc0-40bc-ae04-b1449d4e138e", "alertFirstOccurred": "2025-10-31T05:13:58.451543203Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:52, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451543, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:31097, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "29f0ff1f-2ae6-4246-bd01-9e1652f3d4c9", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451496922Z"}, "alertInfo": {"alertId": "29f0ff1f-2ae6-4246-bd01-9e1652f3d4c9", "alertFirstOccurred": "2025-10-31T05:13:58.451496922Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:53, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451496, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:148828, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "aff2b9da-b7d3-4554-b131-7e0a7126894c", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451168863Z"}, "alertInfo": {"alertId": "aff2b9da-b7d3-4554-b131-7e0a7126894c", "alertFirstOccurred": "2025-10-31T05:13:58.451168863Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:54, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451168, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:192246, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "df935c74-3eec-41cb-857f-faf8e1368c50", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451155243Z"}, "alertInfo": {"alertId": "df935c74-3eec-41cb-857f-faf8e1368c50", "alertFirstOccurred": "2025-10-31T05:13:58.451155243Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:55, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451155, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:25453, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "2360d6f7-a467-4edd-af03-e0675d93f798", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451000149Z"}, "alertInfo": {"alertId": "2360d6f7-a467-4edd-af03-e0675d93f798", "alertFirstOccurred": "2025-10-31T05:13:58.451000149Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:56, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451000, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:168909, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "c69f9f6c-1649-4e83-b3ab-320a9638e29c", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.427505088Z"}, "alertInfo": {"alertId": "c69f9f6c-1649-4e83-b3ab-320a9638e29c", "alertFirstOccurred": "2025-10-31T05:13:58.427505088Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:57, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.427505, _time:2025-10-31T05:13:58.427+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207449, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "f2779edc-ece1-4b52-8d5c-1152e324e7a7", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.427324234Z"}, "alertInfo": {"alertId": "f2779edc-ece1-4b52-8d5c-1152e324e7a7", "alertFirstOccurred": "2025-10-31T05:13:58.427324234Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:58, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.427324, _time:2025-10-31T05:13:58.427+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:111677, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "881f9e9f-aeb4-4b32-a04b-7b1093270b54", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.427309693Z"}, "alertInfo": {"alertId": "881f9e9f-aeb4-4b32-a04b-7b1093270b54", "alertFirstOccurred": "2025-10-31T05:13:58.427309693Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:59, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.427309, _time:2025-10-31T05:13:58.427+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:106279, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "815641b4-4df0-4e85-8054-f15f51cea5d9", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.396493463Z"}, "alertInfo": {"alertId": "815641b4-4df0-4e85-8054-f15f51cea5d9", "alertFirstOccurred": "2025-10-31T05:13:58.396493463Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:60, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.396493, _time:2025-10-31T05:13:58.396+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:192990, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "e0a0f523-9ee7-4b69-ba3d-152b23808fbb", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.396480133Z"}, "alertInfo": {"alertId": "e0a0f523-9ee7-4b69-ba3d-152b23808fbb", "alertFirstOccurred": "2025-10-31T05:13:58.396480133Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:61, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.396480, _time:2025-10-31T05:13:58.396+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:138848, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a5274a54-99cf-4e49-93a4-ef72dda61508", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.151846747Z"}, "alertInfo": {"alertId": "a5274a54-99cf-4e49-93a4-ef72dda61508", "alertFirstOccurred": "2025-10-31T05:13:58.151846747Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:62, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.151846, _time:2025-10-31T05:13:58.151+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:43985, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "37913315-f352-415d-b456-565dae08487c", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.151790275Z"}, "alertInfo": {"alertId": "37913315-f352-415d-b456-565dae08487c", "alertFirstOccurred": "2025-10-31T05:13:58.151790275Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:63, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.151790, _time:2025-10-31T05:13:58.151+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:27722, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "25c6947a-ac7f-40d6-a3f1-eb0e2b618fe8", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.151691442Z"}, "alertInfo": {"alertId": "25c6947a-ac7f-40d6-a3f1-eb0e2b618fe8", "alertFirstOccurred": "2025-10-31T05:13:58.151691442Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:64, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.151691, _time:2025-10-31T05:13:58.151+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:145916, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "ac891fb9-6d13-4ed0-bffd-a7b887999790", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.151522078Z"}, "alertInfo": {"alertId": "ac891fb9-6d13-4ed0-bffd-a7b887999790", "alertFirstOccurred": "2025-10-31T05:13:58.151522078Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:65, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.151522, _time:2025-10-31T05:13:58.151+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:61889, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "4b67747c-7707-49ec-aea3-0e1e2236a863", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.108093904Z"}, "alertInfo": {"alertId": "4b67747c-7707-49ec-aea3-0e1e2236a863", "alertFirstOccurred": "2025-10-31T05:13:58.108093904Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:66, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.108093, _time:2025-10-31T05:13:58.108+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:93970, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "74f3ce1f-5f29-4345-a2f4-7271e6861f8e", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.107602001Z"}, "alertInfo": {"alertId": "74f3ce1f-5f29-4345-a2f4-7271e6861f8e", "alertFirstOccurred": "2025-10-31T05:13:58.107602001Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:67, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.107602, _time:2025-10-31T05:13:58.107+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:11969, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "11730aab-5100-4e1c-a5d3-585b40af93a4", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.107574190Z"}, "alertInfo": {"alertId": "11730aab-5100-4e1c-a5d3-585b40af93a4", "alertFirstOccurred": "2025-10-31T05:13:58.107574190Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:68, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.107574, _time:2025-10-31T05:13:58.107+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:91705, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "7105462f-255d-4e9c-9178-8d1b389b2d33", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.080034610Z"}, "alertInfo": {"alertId": "7105462f-255d-4e9c-9178-8d1b389b2d33", "alertFirstOccurred": "2025-10-31T05:13:58.080034610Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:69, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.080034, _time:2025-10-31T05:13:58.080+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:211041, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "f60e42fd-e797-4063-99d0-701e24c16a6c", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.079536136Z"}, "alertInfo": {"alertId": "f60e42fd-e797-4063-99d0-701e24c16a6c", "alertFirstOccurred": "2025-10-31T05:13:58.079536136Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:70, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.079536, _time:2025-10-31T05:13:58.079+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:94723, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "76319c34-df42-4f8c-ad82-5e63d03a3daa", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.066876771Z"}, "alertInfo": {"alertId": "76319c34-df42-4f8c-ad82-5e63d03a3daa", "alertFirstOccurred": "2025-10-31T05:13:58.066876771Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:71, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.066876, _time:2025-10-31T05:13:58.066+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:154665, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b52395ee-3fa7-49ce-a132-a614d3f2f20d", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.066810569Z"}, "alertInfo": {"alertId": "b52395ee-3fa7-49ce-a132-a614d3f2f20d", "alertFirstOccurred": "2025-10-31T05:13:58.066810569Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:72, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.066810, _time:2025-10-31T05:13:58.066+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:117586, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "8ea73294-a233-4ae4-bf49-d67e19247270", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.060041595Z"}, "alertInfo": {"alertId": "8ea73294-a233-4ae4-bf49-d67e19247270", "alertFirstOccurred": "2025-10-31T05:13:58.060041595Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:73, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.060041, _time:2025-10-31T05:13:58.060+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:84960, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "69569c9f-bb69-4c64-be2d-0642a5acef18", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.059452779Z"}, "alertInfo": {"alertId": "69569c9f-bb69-4c64-be2d-0642a5acef18", "alertFirstOccurred": "2025-10-31T05:13:58.059452779Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:74, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.059452, _time:2025-10-31T05:13:58.059+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:7240, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "0868047d-a546-4bbb-9abf-598195467aff", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.056040136Z"}, "alertInfo": {"alertId": "0868047d-a546-4bbb-9abf-598195467aff", "alertFirstOccurred": "2025-10-31T05:13:58.056040136Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:75, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.056040, _time:2025-10-31T05:13:58.056+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:29657, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "27ef184d-2f6b-4fbe-8a81-51316fc476a3", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.055949203Z"}, "alertInfo": {"alertId": "27ef184d-2f6b-4fbe-8a81-51316fc476a3", "alertFirstOccurred": "2025-10-31T05:13:58.055949203Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:76, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.055949, _time:2025-10-31T05:13:58.055+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:83810, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "67b22c06-38d4-4e70-b12a-45b9d67680de", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.030998954Z"}, "alertInfo": {"alertId": "67b22c06-38d4-4e70-b12a-45b9d67680de", "alertFirstOccurred": "2025-10-31T05:13:58.030998954Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:77, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.030998, _time:2025-10-31T05:13:58.030+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:70300, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "55194605-754b-4e41-bc08-449cc9f6577b", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.030591992Z"}, "alertInfo": {"alertId": "55194605-754b-4e41-bc08-449cc9f6577b", "alertFirstOccurred": "2025-10-31T05:13:58.030591992Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:78, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.030591, _time:2025-10-31T05:13:58.030+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:83922, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "67d10c82-0de2-42fe-a42a-49115273c33d", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.030500050Z"}, "alertInfo": {"alertId": "67d10c82-0de2-42fe-a42a-49115273c33d", "alertFirstOccurred": "2025-10-31T05:13:58.030500050Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:79, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.030500, _time:2025-10-31T05:13:58.030+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:77956, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "6042064e-9afc-42ec-8e2b-6536812c3cd5", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.024935418Z"}, "alertInfo": {"alertId": "6042064e-9afc-42ec-8e2b-6536812c3cd5", "alertFirstOccurred": "2025-10-31T05:13:58.024935418Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:80, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.024935, _time:2025-10-31T05:13:58.024+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:38512, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "311c13c4-0c63-4eaf-9214-615603fe89b9", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.024901577Z"}, "alertInfo": {"alertId": "311c13c4-0c63-4eaf-9214-615603fe89b9", "alertFirstOccurred": "2025-10-31T05:13:58.024901577Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:81, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.024901, _time:2025-10-31T05:13:58.024+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:130207, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "9cb523fe-afc2-4530-96e7-c81540ebf7e9", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.794480868Z"}, "alertInfo": {"alertId": "9cb523fe-afc2-4530-96e7-c81540ebf7e9", "alertFirstOccurred": "2025-10-31T05:13:57.794480868Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:82, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.794480, _time:2025-10-31T05:13:57.794+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:197472, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "e797caf6-30f2-42a8-8f73-abafdd2581ac", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.794450637Z"}, "alertInfo": {"alertId": "e797caf6-30f2-42a8-8f73-abafdd2581ac", "alertFirstOccurred": "2025-10-31T05:13:57.794450637Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:83, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.794450, _time:2025-10-31T05:13:57.794+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:155199, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b5db5345-2492-4a70-9691-933f9c330831", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.794291693Z"}, "alertInfo": {"alertId": "b5db5345-2492-4a70-9691-933f9c330831", "alertFirstOccurred": "2025-10-31T05:13:57.794291693Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "7bbb0491-044d-4e6a-b243-18e6e95a7e97", "policyName": "Same+Digest", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:84, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.794291, _time:2025-10-31T05:13:57.794+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:70072, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "54c22130-2641-4c3b-b906-d26d30e6e77d", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.789449281Z"}, "alertInfo": {"alertId": "54c22130-2641-4c3b-b906-d26d30e6e77d", "alertFirstOccurred": "2025-10-31T05:13:57.789449281Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "4fa22d38-9a23-4350-a219-313d081e88c0", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:85, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.789449, _time:2025-10-31T05:13:57.789+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:18039, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "19ac1ada-1fd8-451f-9c8f-e2339dbb0b0e", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.789054380Z"}, "alertInfo": {"alertId": "19ac1ada-1fd8-451f-9c8f-e2339dbb0b0e", "alertFirstOccurred": "2025-10-31T05:13:57.789054380Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:86, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.789054, _time:2025-10-31T05:13:57.789+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:357, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "00c7f837-dbf0-4078-95a1-2fb781a5f303", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.782383979Z"}, "alertInfo": {"alertId": "00c7f837-dbf0-4078-95a1-2fb781a5f303", "alertFirstOccurred": "2025-10-31T05:13:57.782383979Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "4fa22d38-9a23-4350-a219-313d081e88c0", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:87, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.782383, _time:2025-10-31T05:13:57.782+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:111918, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "883dea6e-469a-4754-a579-d08cdeed6bcc", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.781795552Z"}, "alertInfo": {"alertId": "883dea6e-469a-4754-a579-d08cdeed6bcc", "alertFirstOccurred": "2025-10-31T05:13:57.781795552Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:88, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.781795, _time:2025-10-31T05:13:57.781+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:107855, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "837bb3ab-5e44-44a1-8887-c0fb57a95c72", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.780456436Z"}, "alertInfo": {"alertId": "837bb3ab-5e44-44a1-8887-c0fb57a95c72", "alertFirstOccurred": "2025-10-31T05:13:57.780456436Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:89, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.780456, _time:2025-10-31T05:13:57.780+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:74796, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "5a9d48c9-1a85-4b63-bfef-23fb4ea934aa", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.780433265Z"}, "alertInfo": {"alertId": "5a9d48c9-1a85-4b63-bfef-23fb4ea934aa", "alertFirstOccurred": "2025-10-31T05:13:57.780433265Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:90, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.780433, _time:2025-10-31T05:13:57.780+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:77833, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "60267079-4bd6-46f4-b141-4778d7b6462f", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.780259461Z"}, "alertInfo": {"alertId": "60267079-4bd6-46f4-b141-4778d7b6462f", "alertFirstOccurred": "2025-10-31T05:13:57.780259461Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "4fa22d38-9a23-4350-a219-313d081e88c0", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:91, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.780259, _time:2025-10-31T05:13:57.780+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:29793, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "2802b8ae-0a00-49bc-be13-9a211fb4ffc1", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.774747491Z"}, "alertInfo": {"alertId": "2802b8ae-0a00-49bc-be13-9a211fb4ffc1", "alertFirstOccurred": "2025-10-31T05:13:57.774747491Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:92, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.774747, _time:2025-10-31T05:13:57.774+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:93720, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "74a8982a-b96c-4183-b42e-22331038d7da", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.774725830Z"}, "alertInfo": {"alertId": "74a8982a-b96c-4183-b42e-22331038d7da", "alertFirstOccurred": "2025-10-31T05:13:57.774725830Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:93, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.774725, _time:2025-10-31T05:13:57.774+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:76861, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "5dca47bc-2ba5-4e9c-9a29-20d0fe33ab54", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.774703119Z"}, "alertInfo": {"alertId": "5dca47bc-2ba5-4e9c-9a29-20d0fe33ab54", "alertFirstOccurred": "2025-10-31T05:13:57.774703119Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "4fa22d38-9a23-4350-a219-313d081e88c0", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:94, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.774703, _time:2025-10-31T05:13:57.774+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:13162, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "13265b85-b3c9-45d2-9995-1f29cd108cfa", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.774375970Z"}, "alertInfo": {"alertId": "13265b85-b3c9-45d2-9995-1f29cd108cfa", "alertFirstOccurred": "2025-10-31T05:13:57.774375970Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "7bbb0491-044d-4e6a-b243-18e6e95a7e97", "policyName": "Same+Digest", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:95, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.774375, _time:2025-10-31T05:13:57.774+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:120814, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "92552cd9-8ac6-4ec1-bcd6-8058e9fe1a10", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.755871006Z"}, "alertInfo": {"alertId": "92552cd9-8ac6-4ec1-bcd6-8058e9fe1a10", "alertFirstOccurred": "2025-10-31T05:13:57.755871006Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:96, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.755871, _time:2025-10-31T05:13:57.755+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:107802, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "83785f7a-842e-4261-b541-b74e7ee8092a", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.755784304Z"}, "alertInfo": {"alertId": "83785f7a-842e-4261-b541-b74e7ee8092a", "alertFirstOccurred": "2025-10-31T05:13:57.755784304Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "7bbb0491-044d-4e6a-b243-18e6e95a7e97", "policyName": "Same+Digest", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:97, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.755784, _time:2025-10-31T05:13:57.755+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:69387, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "544ba832-8802-4d50-b16f-41a6a713102b", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.754502429Z"}, "alertInfo": {"alertId": "544ba832-8802-4d50-b16f-41a6a713102b", "alertFirstOccurred": "2025-10-31T05:13:57.754502429Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:98, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.754502, _time:2025-10-31T05:13:57.754+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:177152, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "d2141c31-ac49-4299-9a10-a1da7fb72d90", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.753591724Z"}, "alertInfo": {"alertId": "d2141c31-ac49-4299-9a10-a1da7fb72d90", "alertFirstOccurred": "2025-10-31T05:13:57.753591724Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "7bbb0491-044d-4e6a-b243-18e6e95a7e97", "policyName": "Same+Digest", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:99, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.753591, _time:2025-10-31T05:13:57.753+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv]] 05:19:03 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Current Splunk index contains any Network Violation: false and any Process Violation: true 05:19:03 | DEBUG | IntegrationsSplunkViolati | Helpers | Caught exception. Retrying in 15s (attempt 0 of 40): Condition not satisfied: hasNetworkViolation && hasProcessViolation | | false false 05:19:18 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | {"sid":"1761887958.4"} 05:19:18 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | New Search created: 1761887958.4 05:19:33 | DEBUG | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Violations currently indexed in Splunk: [[_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:221123, _indextime:1761887952, _raw:{"violationInfo": {"violationId": "ff2eb0f1-c0be-55f9-9b95-f65e3cdf6162", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:19:01.758461733Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:0, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.758461, _time:2025-10-31T05:19:01.758+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220909, _indextime:1761887937, _raw:{"violationInfo": {"violationId": "7a5fd742-ab64-5ab6-9c89-734c22d9f251", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:18:46.569862664Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:1, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.569862, _time:2025-10-31T05:18:46.569+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:221045, _indextime:1761887937, _raw:{"violationInfo": {"violationId": "69786681-019d-5308-b4eb-fb3a6e049ec1", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:18:46.414826875Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:2, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.414826, _time:2025-10-31T05:18:46.414+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220976, _indextime:1761887937, _raw:{"violationInfo": {"violationId": "e0a2abe7-8539-5ab2-aedf-619dfc393a16", "violationMessage": "Unexpected network flow found in deployment. Source name: 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'. Destination name: 'Internal Entities'. Destination port: '443'. Protocol: 'L4_PROTOCOL_TCP'.", "violationType": "NETWORK_FLOW", "violationTime": "2025-10-31T05:18:44.987567054Z"}, "alertInfo": {"alertId": "98782e12-709e-494d-9123-70885188c475", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "1b74ffdd-8e67-444c-9814-1c23863c8ccb", "policyName": "Unauthorized Network Flow", "policyDescription": "This policy generates a violation for the network flows that fall outside baselines for which 'alert on anomalous violations' is set.", "policyRationale": "The network baseline is a list of flows that are allowed, and once it is frozen, any flow outside that is a concern.", "policyCategories": ["Anomalous Activity", "Zero Trust"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}, "networkFlowInfo": {"protocol": "L4_PROTOCOL_TCP", "source": {"name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "entityType": "DEPLOYMENT", "deploymentNamespace": "qa-splunk", "deploymentType": "Deployment"}, "destination": {"name": "Internal Entities", "entityType": "INTERNAL_ENTITIES", "port": 443}}}, _serial:3, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.987567, _time:2025-10-31T05:18:44.987+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220831, _indextime:1761887927, _raw:{"violationInfo": {"violationId": "33fa530b-5478-5774-8517-f36362b4ad8d", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:18:36.240275565Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:4, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.240275, _time:2025-10-31T05:18:36.240+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220753, _indextime:1761887917, _raw:{"violationInfo": {"violationId": "3ffcf6be-cc03-59cf-b418-fe0b3d4ba58e", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:18:26.065535503Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:5, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.065535, _time:2025-10-31T05:18:26.065+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220675, _indextime:1761887908, _raw:{"violationInfo": {"violationId": "a90fcdb6-2c56-5242-97ea-a8bd25040b14", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:18:15.891622255Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:6, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.891622, _time:2025-10-31T05:18:15.891+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207714, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "132284b3-298a-59bd-aa1a-a4937117de8a", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.45.18:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.45.18:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:35.842454290Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:7, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.842454, _time:2025-10-31T05:17:35.842+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:63611, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "1619f084-0452-43f4-9b6d-46f6c65c6cc9", "violationMessage": "Binary '/usr/bin/curl' executed with arguments 'http://127.0.0.1:10248/ --max-time 2' under user ID 999", "violationType": "PROCESS_EVENT", "violationTime": "2025-10-31T05:17:35.678145616Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "podUid": "a62bc938-104d-5898-a4a0-8b068136b6c1", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "containerStartTime": "2025-10-31T05:16:10Z", "containerId": "af8a0cf14aa1"}, "alertInfo": {"alertId": "4cecd7a7-9648-41ff-af96-53cd925c792d", "lifecycleStage": "RUNTIME"}, "processInfo": {"processViolationId": "1619f084-0452-43f4-9b6d-46f6c65c6cc9", "processSignalId": "e9391246-b618-11f0-bf6b-0a580a830018", "processCreationTime": "2025-10-31T05:17:35.678145616Z", "processName": "curl", "processArgs": "http://127.0.0.1:10248/ --max-time 2", "execFilePath": "/usr/bin/curl", "pid": 61724, "processUid": 999, "processGid": 999}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "86804b96-e87e-4eae-b56e-1718a8a55763", "policyName": "Process Targeting Cluster Kubelet Endpoint", "policyDescription": "Detects misuse of the healthz/kubelet API/heapster endpoint", "policyRationale": "A pod communicating to a Kubernetes API from via command line is highly irregular", "policyCategories": ["Kubernetes"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:8, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.678145, _time:2025-10-31T05:17:35.678+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207792, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "3efc8639-7a67-500e-9491-8be447b608e5", "violationMessage": "Kubernetes API received exec 'curl http://127.0.0.1:10248/ --max-time 2' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl http://127.0.0.1:10248/ --max-time 2"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:35.659398286Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:9, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.659398, _time:2025-10-31T05:17:35.659+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:36943, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "3e59f7db-8bcf-5074-ab43-bd126aa9c273", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:35.020466225Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:10, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.020466, _time:2025-10-31T05:17:35.020+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37010, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "20676a69-5fcf-5299-954d-f633bde47494", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:34.838842722Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:11, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.838842, _time:2025-10-31T05:17:34.838+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37077, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "06df3370-942f-5874-8618-c1444f7b2a15", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:34.516430442Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:12, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.516430, _time:2025-10-31T05:17:34.516+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37144, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "120ddd13-2c61-58b9-a141-cf7b7191fe4d", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:28.144163920Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:13, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.144163, _time:2025-10-31T05:17:28.144+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37211, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b9329827-692a-5d3f-b327-df4126488749", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:51.999322190Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:14, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.999322, _time:2025-10-31T05:16:51.999+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207868, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a14dcc58-e481-5ed9-ae9b-a37990042f44", "violationMessage": "Kubernetes API received exec 'sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:51.044484644Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:15, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.044484, _time:2025-10-31T05:16:51.044+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37278, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "7fc2eb95-80ea-52c6-8a25-3d611f6fba00", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:50.087513492Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:16, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.087513, _time:2025-10-31T05:16:50.087+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37345, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "4c48b481-4f8b-5dfb-8790-d551f6530d1b", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.972332890Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:17, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.972332, _time:2025-10-31T05:16:47.972+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207946, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "5a9fd142-5975-5c2f-a769-d36341ab0132", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; exit $e' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; exit $e"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.869826793Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:18, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.869826, _time:2025-10-31T05:16:47.869+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208030, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "38c63ecd-1936-5897-9712-10c7e86044c2", "violationMessage": "Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar'' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar'"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.765808014Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:19, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.765808, _time:2025-10-31T05:16:47.765+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208108, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "3c492b4f-fee8-5cc5-96bf-247f55eb08e8", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar' && echo $?' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar' && echo $?"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.590607395Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:20, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.590607, _time:2025-10-31T05:16:47.590+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208188, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "88aae80b-5d66-5f94-95b3-2f22ce1d8b90", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; exit $e' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; exit $e"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.489204126Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:21, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.489204, _time:2025-10-31T05:16:47.489+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208272, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "3f6c6501-f181-5fa7-8dd4-122e994b2598", "violationMessage": "Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar'' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar'"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.392649860Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:22, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.392649, _time:2025-10-31T05:16:47.392+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208350, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "c0d38ef6-ebf9-5ede-b41f-f80c5aa79262", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar' && echo $?' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar' && echo $?"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.150668427Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:23, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.150668, _time:2025-10-31T05:16:47.150+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37412, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "85775d08-f0a6-5e74-8217-9de6c7c6fbda", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:43.804403445Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:24, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.804403, _time:2025-10-31T05:16:43.804+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37479, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "0fcf88e1-5928-520e-ac62-d310e9271350", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:33.707458371Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:25, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.707458, _time:2025-10-31T05:16:33.707+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:107431, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "82f66213-cb0d-438c-ba00-7ca5478dc515", "violationMessage": "Container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' allows privilege escalation", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070429425Z"}, "alertInfo": {"alertId": "82f66213-cb0d-438c-ba00-7ca5478dc515", "alertFirstOccurred": "2025-10-31T05:16:32.070429425Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "16c95922-08c4-41b6-a721-dc4b2a806632", "policyName": "Container with privilege escalation allowed", "policyDescription": "Alerts if a deployment has containers with allowPrivilegeEscalation set to true in its security context.", "policyRationale": "A container process can run with more privileges than its parent process if the container's security context has the boolean setting allowPrivilegeEscalation enabled. In Kubernetes pods, this setting is true by default. Set the value to false if the pod is to run as a non-root user.", "policyCategories": ["Privileges", "Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:26, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070429, _time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:76745, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "5d958a3d-b274-4149-9e22-678b7ba8406d", "violationMessage": "CPU request set to 0 cores for container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'\nMemory limit set to 0 MB for container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070409464Z"}, "alertInfo": {"alertId": "5d958a3d-b274-4149-9e22-678b7ba8406d", "alertFirstOccurred": "2025-10-31T05:16:32.070409464Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "886c3c94-3a6a-4f2b-82fc-d6bf5a310840", "policyName": "No CPU request or memory limit specified", "policyDescription": "Alert on deployments that have containers without CPU request or memory limit", "policyRationale": "A container without a specified CPU request may be starved for CPU time, while a container without a specified memory limit may cause the host to become over-provisioned.", "policyCategories": ["Devops Best Practices", "Docker Cis"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:27, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070409, _time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:161215, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "be23906d-3128-43a1-8339-7c5daad85d30", "violationMessage": "Deployment mounts the service account tokens.\nNamespace has name 'qa-splunk'\nService Account is set to 'default'", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070240100Z"}, "alertInfo": {"alertId": "be23906d-3128-43a1-8339-7c5daad85d30", "alertFirstOccurred": "2025-10-31T05:16:32.070240100Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "fb8f8732-c31d-496b-8fb1-d5abe6056e27", "policyName": "Pod Service Account Token Automatically Mounted", "policyDescription": "Protect pod default service account tokens from compromise by minimizing the mounting of the default service account token to only those pods whose application requires interaction with the Kubernetes API.", "policyRationale": "By default, Kubernetes automatically provisions a service account for each pod and mounts the secret at runtime. This service account is not typically used. If this pod is compromised and the compromised user has access to the service account, the service account could be used to escalate privileges within the cluster. To reduce the likelihood of privilege escalation this service account should not be mounted by default unless the pod requires direct access to the Kubernetes API as part of the pods functionality.", "policyCategories": ["Privileges", "Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:28, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070240, _time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:9817, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "0ce2dfee-80f3-48fe-899e-3e00291c91e0", "violationMessage": "Environment variable 'SPLUNK_PASSWORD' is present in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070160968Z"}, "alertInfo": {"alertId": "0ce2dfee-80f3-48fe-899e-3e00291c91e0", "alertFirstOccurred": "2025-10-31T05:16:32.070160968Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "f4996314-c3d7-4553-803b-b24ce7febe48", "policyName": "Environment Variable Contains Secret", "policyDescription": "Alert on deployments with environment variables that contain 'SECRET'", "policyRationale": "Using secrets in environment variables may allow inspection into your secrets from the host or even through the orchestrator UI.", "policyCategories": ["Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:29, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070160, _time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:5747, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "064ae5a8-deb1-4779-b793-9da140f841a3", "violationMessage": "Container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' includes component 'microdnf' (version 3.8.0-2.el8.x86_64)\nContainer 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' includes component 'rpm' (version 4.14.3-26.el8.x86_64)", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070054845Z"}, "alertInfo": {"alertId": "064ae5a8-deb1-4779-b793-9da140f841a3", "alertFirstOccurred": "2025-10-31T05:16:32.070054845Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "f95ff08d-130a-465a-a27e-32ed1fb05555", "policyName": "Red Hat Package Manager in Image", "policyDescription": "Alert on deployments with components of the Red Hat/Fedora/CentOS package management system.", "policyRationale": "Package managers make it easier for attackers to use compromised containers, since they can easily add software.", "policyCategories": ["Security Best Practices"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "LOW_SEVERITY", "policyVersion": "1.1"}}, _serial:30, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070054, _time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:218439, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "fd02d1e5-c03d-42b2-b1f4-a362d17bfeb5", "violationMessage": "Container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' has image created at 2023-06-03 01:21:18 (UTC)", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.069470589Z"}, "alertInfo": {"alertId": "fd02d1e5-c03d-42b2-b1f4-a362d17bfeb5", "alertFirstOccurred": "2025-10-31T05:16:32.069470589Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "2db9a279-2aec-4618-a85d-7f1bdf4911b1", "policyName": "90-Day Image Age", "policyDescription": "Alert on deployments with images that haven't been updated in 90 days", "policyRationale": "Base images are updated frequently with bug fixes and vulnerability patches. Image age exceeding 90 days may indicate a higher risk of vulnerabilities existing in the image.", "policyCategories": ["Devops Best Practices", "Security Best Practices", "Supply Chain Security"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "LOW_SEVERITY", "policyVersion": "1.1"}}, _serial:31, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.069470, _time:2025-10-31T05:16:32.069+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:140656, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a7e813dc-e164-4fa2-851b-2ddc49981d96", "violationMessage": "Fixable CVE-2019-16942 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.1\nFixable CVE-2019-16943 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.1\nFixable CVE-2019-17531 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.1\nFixable CVE-2019-20330 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.2\nFixable CVE-2020-10650 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-10672 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-10673 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-10968 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-10969 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11111 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11112 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11113 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11619 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11620 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-13949 (CVSS 7.5) (severity Important) found in component 'hive' (version 3.1.3) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 4.0.0\nFixable CVE-2020-14060 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5\nFixable CVE-2020-14061 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5\nFixable CVE-2020-14062 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5\nFixable CVE-2020-14195 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5\nFixable CVE-2020-24616 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.6\nFixable CVE-2020-24750 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.6\nFixable CVE-2020-25649 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.7\nFixable CVE-2020-35490 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-35491 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-35728 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36179 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36180 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36181 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36182 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36183 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36184 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36185 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36186 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36187 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36188 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36189 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36518 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.12.6.1\nFixable CVE-2020-8840 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.3\nFixable CVE-2020-9546 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-9547 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-9548 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2021-20190 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.7\nFixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2019.6.16) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2022.12.7\nFixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2022.9.24) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2022.12.7\nFixable CVE-2022-3171 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 3.16.3\nFixable CVE-2022-42003 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.12.7.1\nFixable CVE-2022-42004 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.12.7.1\nFixable CVE-2023-0341 (CVSS 7.8) (severity Important) found in component 'editorconfig' (version 0.12.3) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0.12.6\nFixable CVE-2023-2976 (CVSS 7.1) (severity Important) found in component 'guava' (version 11.0.2) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 32.0.0\nFixable CVE-2023-37920 (CVSS 9.8) (severity Critical) found in component 'certifi' (version 2019.6.16) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2023.7.22\nFixable CVE-2023-38325 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 41.0.2\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.12) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.26.17\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.6) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.26.17\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 2.0.2) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.0.6\nFixable CVE-2023-49083 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 41.0.6\nFixable CVE-2023-50782 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 42.0.0\nFixable CVE-2024-26130 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 42.0.4\nFixable CVE-2024-7254 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 3.25.5\nFixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.10.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.15.2\nFixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.11.2) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.15.2\nFixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 47.1.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 78.1.1\nFixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 67.8.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 78.1.1\nFixable CVE-2025-47436 (CVSS 9.8) (severity Critical) found in component 'orc' (version 1.5.8) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.8.9\nFixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-25.el8_8\nFixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-25.el8_8\nFixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.1\nFixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.1\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5837 (CVSS 7.5) (severity Important) found in component 'libnghttp2' (version 1.33.0-3.el8_2.1.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.33.0-5.el8_8\nFixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.2\nFixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.2\nFixable RHSA-2024:10379 (CVSS 7.4) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.3.1-36.el8_10\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-62.el8_10\nFixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-62.el8_10\nFixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'platform-python-setuptools' (version 39.2.0-7.el8.noarch) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:39.2.0-8.el8_10\nFixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'python3-setuptools-wheel' (version 39.2.0-7.el8.noarch) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:39.2.0-8.el8_10\nFixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-30.el8_10\nFixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-30.el8_10\nFixable RHSA-2025:10027 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.3.1-37.el8_10\nFixable RHSA-2025:10110 (CVSS 7) (severity Important) found in component 'sudo' (version 1.8.29-10.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.9.5p2-1.el8_10.1\nFixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-70.el8_10\nFixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-70.el8_10\nFixable RHSA-2025:10698 (CVSS 9.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.9.7-21.el8_10.1\nFixable RHSA-2025:12010 (CVSS 7.7) (severity Important) found in component 'sqlite-libs' (version 3.26.0-17.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.26.0-20.el8_10\nFixable RHSA-2025:12450 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.9.7-21.el8_10.2\nFixable RHSA-2025:14135 (CVSS 7.3) (severity Important) found in component 'libarchive' (version 3.3.3-5.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.3.3-6.el8_10\nFixable RHSA-2025:14557 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.3.1-38.el8_10\nFixable RHSA-2025:2686 (CVSS 8.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.9.7-19.el8_10", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.069385696Z"}, "alertInfo": {"alertId": "a7e813dc-e164-4fa2-851b-2ddc49981d96", "alertFirstOccurred": "2025-10-31T05:16:32.069385696Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "a919ccaf-6b43-4160-ac5d-a405e1440a41", "policyName": "Fixable Severity at least Important", "policyDescription": "Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important", "policyRationale": "Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s).", "policyCategories": ["Vulnerability Management"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:32, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.069385, _time:2025-10-31T05:16:32.069+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37546, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "24e469b6-67fb-56de-ada2-0f84d074195b", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:23.639385445Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:33, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.639385, _time:2025-10-31T05:16:23.639+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37613, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "75f2829a-79b8-5056-a135-a060dfb82ef8", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:13.563027882Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:34, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.563027, _time:2025-10-31T05:16:13.563+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:181394, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "d6827df1-4090-402a-a132-0d6cd44c5665", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.751223610Z"}, "alertInfo": {"alertId": "d6827df1-4090-402a-a132-0d6cd44c5665", "alertFirstOccurred": "2025-10-31T05:13:58.751223610Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:35, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.751223, _time:2025-10-31T05:13:58.751+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:134815, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a0ef76c5-1cb9-4ac7-9338-d75de5cf0128", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.526414594Z"}, "alertInfo": {"alertId": "a0ef76c5-1cb9-4ac7-9338-d75de5cf0128", "alertFirstOccurred": "2025-10-31T05:13:58.526414594Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:36, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.526414, _time:2025-10-31T05:13:58.526+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:160667, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "bcbb941b-f112-4220-8b79-fc1f2a86cbd5", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.526391463Z"}, "alertInfo": {"alertId": "bcbb941b-f112-4220-8b79-fc1f2a86cbd5", "alertFirstOccurred": "2025-10-31T05:13:58.526391463Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:37, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.526391, _time:2025-10-31T05:13:58.526+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:61662, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "4b3720ea-b24d-48a3-af7a-19189db42181", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.521906811Z"}, "alertInfo": {"alertId": "4b3720ea-b24d-48a3-af7a-19189db42181", "alertFirstOccurred": "2025-10-31T05:13:58.521906811Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:38, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.521906, _time:2025-10-31T05:13:58.521+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:150980, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b22bf77b-fbb6-4c1f-9015-60de3bc86aa3", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.521870920Z"}, "alertInfo": {"alertId": "b22bf77b-fbb6-4c1f-9015-60de3bc86aa3", "alertFirstOccurred": "2025-10-31T05:13:58.521870920Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:39, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.521870, _time:2025-10-31T05:13:58.521+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:36897, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "301f5e00-6448-4ba5-9e3e-4c4dd76d6940", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.508932907Z"}, "alertInfo": {"alertId": "301f5e00-6448-4ba5-9e3e-4c4dd76d6940", "alertFirstOccurred": "2025-10-31T05:13:58.508932907Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:40, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.508932, _time:2025-10-31T05:13:58.508+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:106546, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "81d8cc6a-5dfb-4700-bcfa-32b8f6491a9f", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.508911087Z"}, "alertInfo": {"alertId": "81d8cc6a-5dfb-4700-bcfa-32b8f6491a9f", "alertFirstOccurred": "2025-10-31T05:13:58.508911087Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:41, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.508911, _time:2025-10-31T05:13:58.508+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:72369, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "56f57eae-d48c-48b6-9c32-88a702b2039b", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.502763149Z"}, "alertInfo": {"alertId": "56f57eae-d48c-48b6-9c32-88a702b2039b", "alertFirstOccurred": "2025-10-31T05:13:58.502763149Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:42, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.502763, _time:2025-10-31T05:13:58.502+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:135171, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a144ac21-00ad-4e5f-a63f-17875fb8e557", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.502724608Z"}, "alertInfo": {"alertId": "a144ac21-00ad-4e5f-a63f-17875fb8e557", "alertFirstOccurred": "2025-10-31T05:13:58.502724608Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:43, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.502724, _time:2025-10-31T05:13:58.502+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:152598, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b387f52f-7df2-4020-8fd3-acc11115d7c1", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.495986315Z"}, "alertInfo": {"alertId": "b387f52f-7df2-4020-8fd3-acc11115d7c1", "alertFirstOccurred": "2025-10-31T05:13:58.495986315Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:44, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.495986, _time:2025-10-31T05:13:58.495+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:203113, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "ee163879-62e0-4af9-a360-5cd1719305d4", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.495973314Z"}, "alertInfo": {"alertId": "ee163879-62e0-4af9-a360-5cd1719305d4", "alertFirstOccurred": "2025-10-31T05:13:58.495973314Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:45, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.495973, _time:2025-10-31T05:13:58.495+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:95289, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "76b96af2-5b4d-4e16-a910-e8221a6d1a8d", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.495696527Z"}, "alertInfo": {"alertId": "76b96af2-5b4d-4e16-a910-e8221a6d1a8d", "alertFirstOccurred": "2025-10-31T05:13:58.495696527Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:46, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.495696, _time:2025-10-31T05:13:58.495+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:132228, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "9ec938d0-4cb9-4da0-908c-476db46cafad", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.495677136Z"}, "alertInfo": {"alertId": "9ec938d0-4cb9-4da0-908c-476db46cafad", "alertFirstOccurred": "2025-10-31T05:13:58.495677136Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:47, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.495677, _time:2025-10-31T05:13:58.495+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:205362, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "f0d4371a-b218-4343-9ca4-d7d266dd6443", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.466810139Z"}, "alertInfo": {"alertId": "f0d4371a-b218-4343-9ca4-d7d266dd6443", "alertFirstOccurred": "2025-10-31T05:13:58.466810139Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:48, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.466810, _time:2025-10-31T05:13:58.466+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:28665, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "27428ec2-09ae-4240-84ac-8fa3fb33ab53", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.466786819Z"}, "alertInfo": {"alertId": "27428ec2-09ae-4240-84ac-8fa3fb33ab53", "alertFirstOccurred": "2025-10-31T05:13:58.466786819Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:49, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.466786, _time:2025-10-31T05:13:58.466+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:192528, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "dfde9d7e-1133-4783-adfe-8143516f0f21", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.466263825Z"}, "alertInfo": {"alertId": "dfde9d7e-1133-4783-adfe-8143516f0f21", "alertFirstOccurred": "2025-10-31T05:13:58.466263825Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:50, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.466263, _time:2025-10-31T05:13:58.466+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:41295, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "33b9daaf-4573-413a-8a75-8839aa9aa474", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.466249774Z"}, "alertInfo": {"alertId": "33b9daaf-4573-413a-8a75-8839aa9aa474", "alertFirstOccurred": "2025-10-31T05:13:58.466249774Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:51, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.466249, _time:2025-10-31T05:13:58.466+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207500, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "f27a8ce8-9d36-4f07-afd8-a55b78b4b3e3", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.457620029Z"}, "alertInfo": {"alertId": "f27a8ce8-9d36-4f07-afd8-a55b78b4b3e3", "alertFirstOccurred": "2025-10-31T05:13:58.457620029Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:52, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.457620, _time:2025-10-31T05:13:58.457+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220126, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "ff4a6ee6-e43d-427b-92a4-dc3a768ddce7", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.457607209Z"}, "alertInfo": {"alertId": "ff4a6ee6-e43d-427b-92a4-dc3a768ddce7", "alertFirstOccurred": "2025-10-31T05:13:58.457607209Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:53, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.457607, _time:2025-10-31T05:13:58.457+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:120, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "0075e051-2154-4ce5-8c6b-20098e70cb2b", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.457428114Z"}, "alertInfo": {"alertId": "0075e051-2154-4ce5-8c6b-20098e70cb2b", "alertFirstOccurred": "2025-10-31T05:13:58.457428114Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:54, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.457428, _time:2025-10-31T05:13:58.457+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:13211, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "13892ab4-79c1-47de-87ec-ee6cd3d93fc4", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451767480Z"}, "alertInfo": {"alertId": "13892ab4-79c1-47de-87ec-ee6cd3d93fc4", "alertFirstOccurred": "2025-10-31T05:13:58.451767480Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:55, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451767, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:106056, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "80f21a2f-4621-4559-aa6e-c273d43abf0d", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451622786Z"}, "alertInfo": {"alertId": "80f21a2f-4621-4559-aa6e-c273d43abf0d", "alertFirstOccurred": "2025-10-31T05:13:58.451622786Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:56, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451622, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:101961, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "7bad106e-8cc0-40bc-ae04-b1449d4e138e", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451543203Z"}, "alertInfo": {"alertId": "7bad106e-8cc0-40bc-ae04-b1449d4e138e", "alertFirstOccurred": "2025-10-31T05:13:58.451543203Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:57, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451543, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:31097, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "29f0ff1f-2ae6-4246-bd01-9e1652f3d4c9", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451496922Z"}, "alertInfo": {"alertId": "29f0ff1f-2ae6-4246-bd01-9e1652f3d4c9", "alertFirstOccurred": "2025-10-31T05:13:58.451496922Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:58, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451496, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:148828, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "aff2b9da-b7d3-4554-b131-7e0a7126894c", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451168863Z"}, "alertInfo": {"alertId": "aff2b9da-b7d3-4554-b131-7e0a7126894c", "alertFirstOccurred": "2025-10-31T05:13:58.451168863Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:59, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451168, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:192246, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "df935c74-3eec-41cb-857f-faf8e1368c50", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451155243Z"}, "alertInfo": {"alertId": "df935c74-3eec-41cb-857f-faf8e1368c50", "alertFirstOccurred": "2025-10-31T05:13:58.451155243Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:60, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451155, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:25453, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "2360d6f7-a467-4edd-af03-e0675d93f798", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451000149Z"}, "alertInfo": {"alertId": "2360d6f7-a467-4edd-af03-e0675d93f798", "alertFirstOccurred": "2025-10-31T05:13:58.451000149Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:61, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451000, _time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:168909, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "c69f9f6c-1649-4e83-b3ab-320a9638e29c", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.427505088Z"}, "alertInfo": {"alertId": "c69f9f6c-1649-4e83-b3ab-320a9638e29c", "alertFirstOccurred": "2025-10-31T05:13:58.427505088Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:62, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.427505, _time:2025-10-31T05:13:58.427+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207449, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "f2779edc-ece1-4b52-8d5c-1152e324e7a7", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.427324234Z"}, "alertInfo": {"alertId": "f2779edc-ece1-4b52-8d5c-1152e324e7a7", "alertFirstOccurred": "2025-10-31T05:13:58.427324234Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:63, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.427324, _time:2025-10-31T05:13:58.427+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:111677, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "881f9e9f-aeb4-4b32-a04b-7b1093270b54", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.427309693Z"}, "alertInfo": {"alertId": "881f9e9f-aeb4-4b32-a04b-7b1093270b54", "alertFirstOccurred": "2025-10-31T05:13:58.427309693Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:64, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.427309, _time:2025-10-31T05:13:58.427+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:106279, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "815641b4-4df0-4e85-8054-f15f51cea5d9", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.396493463Z"}, "alertInfo": {"alertId": "815641b4-4df0-4e85-8054-f15f51cea5d9", "alertFirstOccurred": "2025-10-31T05:13:58.396493463Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:65, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.396493, _time:2025-10-31T05:13:58.396+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:192990, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "e0a0f523-9ee7-4b69-ba3d-152b23808fbb", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.396480133Z"}, "alertInfo": {"alertId": "e0a0f523-9ee7-4b69-ba3d-152b23808fbb", "alertFirstOccurred": "2025-10-31T05:13:58.396480133Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:66, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.396480, _time:2025-10-31T05:13:58.396+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:138848, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a5274a54-99cf-4e49-93a4-ef72dda61508", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.151846747Z"}, "alertInfo": {"alertId": "a5274a54-99cf-4e49-93a4-ef72dda61508", "alertFirstOccurred": "2025-10-31T05:13:58.151846747Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:67, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.151846, _time:2025-10-31T05:13:58.151+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:43985, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "37913315-f352-415d-b456-565dae08487c", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.151790275Z"}, "alertInfo": {"alertId": "37913315-f352-415d-b456-565dae08487c", "alertFirstOccurred": "2025-10-31T05:13:58.151790275Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:68, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.151790, _time:2025-10-31T05:13:58.151+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:27722, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "25c6947a-ac7f-40d6-a3f1-eb0e2b618fe8", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.151691442Z"}, "alertInfo": {"alertId": "25c6947a-ac7f-40d6-a3f1-eb0e2b618fe8", "alertFirstOccurred": "2025-10-31T05:13:58.151691442Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:69, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.151691, _time:2025-10-31T05:13:58.151+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:145916, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "ac891fb9-6d13-4ed0-bffd-a7b887999790", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.151522078Z"}, "alertInfo": {"alertId": "ac891fb9-6d13-4ed0-bffd-a7b887999790", "alertFirstOccurred": "2025-10-31T05:13:58.151522078Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:70, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.151522, _time:2025-10-31T05:13:58.151+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:61889, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "4b67747c-7707-49ec-aea3-0e1e2236a863", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.108093904Z"}, "alertInfo": {"alertId": "4b67747c-7707-49ec-aea3-0e1e2236a863", "alertFirstOccurred": "2025-10-31T05:13:58.108093904Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:71, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.108093, _time:2025-10-31T05:13:58.108+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:93970, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "74f3ce1f-5f29-4345-a2f4-7271e6861f8e", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.107602001Z"}, "alertInfo": {"alertId": "74f3ce1f-5f29-4345-a2f4-7271e6861f8e", "alertFirstOccurred": "2025-10-31T05:13:58.107602001Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:72, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.107602, _time:2025-10-31T05:13:58.107+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:11969, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "11730aab-5100-4e1c-a5d3-585b40af93a4", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.107574190Z"}, "alertInfo": {"alertId": "11730aab-5100-4e1c-a5d3-585b40af93a4", "alertFirstOccurred": "2025-10-31T05:13:58.107574190Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:73, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.107574, _time:2025-10-31T05:13:58.107+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:91705, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "7105462f-255d-4e9c-9178-8d1b389b2d33", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.080034610Z"}, "alertInfo": {"alertId": "7105462f-255d-4e9c-9178-8d1b389b2d33", "alertFirstOccurred": "2025-10-31T05:13:58.080034610Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:74, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.080034, _time:2025-10-31T05:13:58.080+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:211041, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "f60e42fd-e797-4063-99d0-701e24c16a6c", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.079536136Z"}, "alertInfo": {"alertId": "f60e42fd-e797-4063-99d0-701e24c16a6c", "alertFirstOccurred": "2025-10-31T05:13:58.079536136Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:75, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.079536, _time:2025-10-31T05:13:58.079+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:94723, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "76319c34-df42-4f8c-ad82-5e63d03a3daa", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.066876771Z"}, "alertInfo": {"alertId": "76319c34-df42-4f8c-ad82-5e63d03a3daa", "alertFirstOccurred": "2025-10-31T05:13:58.066876771Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:76, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.066876, _time:2025-10-31T05:13:58.066+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:154665, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b52395ee-3fa7-49ce-a132-a614d3f2f20d", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.066810569Z"}, "alertInfo": {"alertId": "b52395ee-3fa7-49ce-a132-a614d3f2f20d", "alertFirstOccurred": "2025-10-31T05:13:58.066810569Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:77, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.066810, _time:2025-10-31T05:13:58.066+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:117586, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "8ea73294-a233-4ae4-bf49-d67e19247270", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.060041595Z"}, "alertInfo": {"alertId": "8ea73294-a233-4ae4-bf49-d67e19247270", "alertFirstOccurred": "2025-10-31T05:13:58.060041595Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:78, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.060041, _time:2025-10-31T05:13:58.060+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:84960, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "69569c9f-bb69-4c64-be2d-0642a5acef18", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.059452779Z"}, "alertInfo": {"alertId": "69569c9f-bb69-4c64-be2d-0642a5acef18", "alertFirstOccurred": "2025-10-31T05:13:58.059452779Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:79, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.059452, _time:2025-10-31T05:13:58.059+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:7240, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "0868047d-a546-4bbb-9abf-598195467aff", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.056040136Z"}, "alertInfo": {"alertId": "0868047d-a546-4bbb-9abf-598195467aff", "alertFirstOccurred": "2025-10-31T05:13:58.056040136Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:80, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.056040, _time:2025-10-31T05:13:58.056+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:29657, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "27ef184d-2f6b-4fbe-8a81-51316fc476a3", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.055949203Z"}, "alertInfo": {"alertId": "27ef184d-2f6b-4fbe-8a81-51316fc476a3", "alertFirstOccurred": "2025-10-31T05:13:58.055949203Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:81, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.055949, _time:2025-10-31T05:13:58.055+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:83810, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "67b22c06-38d4-4e70-b12a-45b9d67680de", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.030998954Z"}, "alertInfo": {"alertId": "67b22c06-38d4-4e70-b12a-45b9d67680de", "alertFirstOccurred": "2025-10-31T05:13:58.030998954Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:82, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.030998, _time:2025-10-31T05:13:58.030+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:70300, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "55194605-754b-4e41-bc08-449cc9f6577b", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.030591992Z"}, "alertInfo": {"alertId": "55194605-754b-4e41-bc08-449cc9f6577b", "alertFirstOccurred": "2025-10-31T05:13:58.030591992Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:83, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.030591, _time:2025-10-31T05:13:58.030+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:83922, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "67d10c82-0de2-42fe-a42a-49115273c33d", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.030500050Z"}, "alertInfo": {"alertId": "67d10c82-0de2-42fe-a42a-49115273c33d", "alertFirstOccurred": "2025-10-31T05:13:58.030500050Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:84, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.030500, _time:2025-10-31T05:13:58.030+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:77956, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "6042064e-9afc-42ec-8e2b-6536812c3cd5", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.024935418Z"}, "alertInfo": {"alertId": "6042064e-9afc-42ec-8e2b-6536812c3cd5", "alertFirstOccurred": "2025-10-31T05:13:58.024935418Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:85, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.024935, _time:2025-10-31T05:13:58.024+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:38512, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "311c13c4-0c63-4eaf-9214-615603fe89b9", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.024901577Z"}, "alertInfo": {"alertId": "311c13c4-0c63-4eaf-9214-615603fe89b9", "alertFirstOccurred": "2025-10-31T05:13:58.024901577Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:86, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.024901, _time:2025-10-31T05:13:58.024+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:130207, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "9cb523fe-afc2-4530-96e7-c81540ebf7e9", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.794480868Z"}, "alertInfo": {"alertId": "9cb523fe-afc2-4530-96e7-c81540ebf7e9", "alertFirstOccurred": "2025-10-31T05:13:57.794480868Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:87, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.794480, _time:2025-10-31T05:13:57.794+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:197472, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "e797caf6-30f2-42a8-8f73-abafdd2581ac", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.794450637Z"}, "alertInfo": {"alertId": "e797caf6-30f2-42a8-8f73-abafdd2581ac", "alertFirstOccurred": "2025-10-31T05:13:57.794450637Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:88, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.794450, _time:2025-10-31T05:13:57.794+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:155199, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b5db5345-2492-4a70-9691-933f9c330831", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.794291693Z"}, "alertInfo": {"alertId": "b5db5345-2492-4a70-9691-933f9c330831", "alertFirstOccurred": "2025-10-31T05:13:57.794291693Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "7bbb0491-044d-4e6a-b243-18e6e95a7e97", "policyName": "Same+Digest", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:89, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.794291, _time:2025-10-31T05:13:57.794+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:70072, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "54c22130-2641-4c3b-b906-d26d30e6e77d", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.789449281Z"}, "alertInfo": {"alertId": "54c22130-2641-4c3b-b906-d26d30e6e77d", "alertFirstOccurred": "2025-10-31T05:13:57.789449281Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "4fa22d38-9a23-4350-a219-313d081e88c0", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:90, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.789449, _time:2025-10-31T05:13:57.789+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:18039, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "19ac1ada-1fd8-451f-9c8f-e2339dbb0b0e", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.789054380Z"}, "alertInfo": {"alertId": "19ac1ada-1fd8-451f-9c8f-e2339dbb0b0e", "alertFirstOccurred": "2025-10-31T05:13:57.789054380Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:91, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.789054, _time:2025-10-31T05:13:57.789+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:357, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "00c7f837-dbf0-4078-95a1-2fb781a5f303", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.782383979Z"}, "alertInfo": {"alertId": "00c7f837-dbf0-4078-95a1-2fb781a5f303", "alertFirstOccurred": "2025-10-31T05:13:57.782383979Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "4fa22d38-9a23-4350-a219-313d081e88c0", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:92, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.782383, _time:2025-10-31T05:13:57.782+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:111918, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "883dea6e-469a-4754-a579-d08cdeed6bcc", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.781795552Z"}, "alertInfo": {"alertId": "883dea6e-469a-4754-a579-d08cdeed6bcc", "alertFirstOccurred": "2025-10-31T05:13:57.781795552Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:93, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.781795, _time:2025-10-31T05:13:57.781+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:107855, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "837bb3ab-5e44-44a1-8887-c0fb57a95c72", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.780456436Z"}, "alertInfo": {"alertId": "837bb3ab-5e44-44a1-8887-c0fb57a95c72", "alertFirstOccurred": "2025-10-31T05:13:57.780456436Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:94, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.780456, _time:2025-10-31T05:13:57.780+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:74796, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "5a9d48c9-1a85-4b63-bfef-23fb4ea934aa", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.780433265Z"}, "alertInfo": {"alertId": "5a9d48c9-1a85-4b63-bfef-23fb4ea934aa", "alertFirstOccurred": "2025-10-31T05:13:57.780433265Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:95, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.780433, _time:2025-10-31T05:13:57.780+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:77833, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "60267079-4bd6-46f4-b141-4778d7b6462f", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.780259461Z"}, "alertInfo": {"alertId": "60267079-4bd6-46f4-b141-4778d7b6462f", "alertFirstOccurred": "2025-10-31T05:13:57.780259461Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "4fa22d38-9a23-4350-a219-313d081e88c0", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:96, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.780259, _time:2025-10-31T05:13:57.780+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:29793, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "2802b8ae-0a00-49bc-be13-9a211fb4ffc1", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.774747491Z"}, "alertInfo": {"alertId": "2802b8ae-0a00-49bc-be13-9a211fb4ffc1", "alertFirstOccurred": "2025-10-31T05:13:57.774747491Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:97, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.774747, _time:2025-10-31T05:13:57.774+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:93720, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "74a8982a-b96c-4183-b42e-22331038d7da", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.774725830Z"}, "alertInfo": {"alertId": "74a8982a-b96c-4183-b42e-22331038d7da", "alertFirstOccurred": "2025-10-31T05:13:57.774725830Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:98, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.774725, _time:2025-10-31T05:13:57.774+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv], [_bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:76861, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "5dca47bc-2ba5-4e9c-9a29-20d0fe33ab54", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.774703119Z"}, "alertInfo": {"alertId": "5dca47bc-2ba5-4e9c-9a29-20d0fe33ab54", "alertFirstOccurred": "2025-10-31T05:13:57.774703119Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "4fa22d38-9a23-4350-a219-313d081e88c0", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:99, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.774703, _time:2025-10-31T05:13:57.774+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv]] 05:19:33 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Current Splunk index contains any Network Violation: true and any Process Violation: true 05:19:33 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Starting conversion of ACS violations to Splunk alerts 05:19:33 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | {"sid":"1761887973.5"} 05:19:33 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | New Search created: 1761887973.5 05:19:49 | DEBUG | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Alerts currently indexed in Splunk: [[_time:2025-10-31T05:19:18.098+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:3fbb5f5e-50be-50f1-8fb4-0118b5c63def, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:221190, _indextime:1761887972, _raw:{"violationInfo": {"violationId": "3fbb5f5e-50be-50f1-8fb4-0118b5c63def", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:19:18.098616795Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:0, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.098616], [_time:2025-10-31T05:19:01.758+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:ff2eb0f1-c0be-55f9-9b95-f65e3cdf6162, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:221123, _indextime:1761887952, _raw:{"violationInfo": {"violationId": "ff2eb0f1-c0be-55f9-9b95-f65e3cdf6162", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:19:01.758461733Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:1, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.758461], [_time:2025-10-31T05:18:46.569+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:7a5fd742-ab64-5ab6-9c89-734c22d9f251, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220909, _indextime:1761887937, _raw:{"violationInfo": {"violationId": "7a5fd742-ab64-5ab6-9c89-734c22d9f251", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:18:46.569862664Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:2, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.569862], [_time:2025-10-31T05:18:46.414+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:69786681-019d-5308-b4eb-fb3a6e049ec1, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:221045, _indextime:1761887937, _raw:{"violationInfo": {"violationId": "69786681-019d-5308-b4eb-fb3a6e049ec1", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:18:46.414826875Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:3, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.414826], [_time:2025-10-31T05:18:44.987+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Unexpected network flow found in deployment. Source name: 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'. Destination name: 'Internal Entities'. Destination port: '443'. Protocol: 'L4_PROTOCOL_TCP'., dest_type:INTERNAL_ENTITIES, id:e0a2abe7-8539-5ab2-aedf-619dfc393a16, signature:This policy generates a violation for the network flows that fall outside baselines for which 'alert on anomalous violations' is set., src_type:Deployment, app:stackrox, dest:Internal Entities, severity:high, signature_id:Unauthorized Network Flow, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220976, _indextime:1761887937, _raw:{"violationInfo": {"violationId": "e0a2abe7-8539-5ab2-aedf-619dfc393a16", "violationMessage": "Unexpected network flow found in deployment. Source name: 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'. Destination name: 'Internal Entities'. Destination port: '443'. Protocol: 'L4_PROTOCOL_TCP'.", "violationType": "NETWORK_FLOW", "violationTime": "2025-10-31T05:18:44.987567054Z"}, "alertInfo": {"alertId": "98782e12-709e-494d-9123-70885188c475", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "1b74ffdd-8e67-444c-9814-1c23863c8ccb", "policyName": "Unauthorized Network Flow", "policyDescription": "This policy generates a violation for the network flows that fall outside baselines for which 'alert on anomalous violations' is set.", "policyRationale": "The network baseline is a list of flows that are allowed, and once it is frozen, any flow outside that is a concern.", "policyCategories": ["Anomalous Activity", "Zero Trust"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}, "networkFlowInfo": {"protocol": "L4_PROTOCOL_TCP", "source": {"name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "entityType": "DEPLOYMENT", "deploymentNamespace": "qa-splunk", "deploymentType": "Deployment"}, "destination": {"name": "Internal Entities", "entityType": "INTERNAL_ENTITIES", "port": 443}}}, _serial:4, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.987567], [_time:2025-10-31T05:18:36.240+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:33fa530b-5478-5774-8517-f36362b4ad8d, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220831, _indextime:1761887927, _raw:{"violationInfo": {"violationId": "33fa530b-5478-5774-8517-f36362b4ad8d", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:18:36.240275565Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:5, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.240275], [_time:2025-10-31T05:18:26.065+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:3ffcf6be-cc03-59cf-b418-fe0b3d4ba58e, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220753, _indextime:1761887917, _raw:{"violationInfo": {"violationId": "3ffcf6be-cc03-59cf-b418-fe0b3d4ba58e", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:18:26.065535503Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:6, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.065535], [_time:2025-10-31T05:18:15.891+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:a90fcdb6-2c56-5242-97ea-a8bd25040b14, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220675, _indextime:1761887908, _raw:{"violationInfo": {"violationId": "a90fcdb6-2c56-5242-97ea-a8bd25040b14", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:18:15.891622255Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:7, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.891622], [_time:2025-10-31T05:17:35.842+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.45.18:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:132284b3-298a-59bd-aa1a-a4937117de8a, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207714, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "132284b3-298a-59bd-aa1a-a4937117de8a", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.45.18:443' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.45.18:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:35.842454290Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:8, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.842454], [_time:2025-10-31T05:17:35.678+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Binary '/usr/bin/curl' executed with arguments 'http://127.0.0.1:10248/ --max-time 2' under user ID 999, id:1619f084-0452-43f4-9b6d-46f6c65c6cc9, signature:Detects misuse of the healthz/kubelet API/heapster endpoint, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Process Targeting Cluster Kubelet Endpoint, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:999:999, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:63611, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "1619f084-0452-43f4-9b6d-46f6c65c6cc9", "violationMessage": "Binary '/usr/bin/curl' executed with arguments 'http://127.0.0.1:10248/ --max-time 2' under user ID 999", "violationType": "PROCESS_EVENT", "violationTime": "2025-10-31T05:17:35.678145616Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "podUid": "a62bc938-104d-5898-a4a0-8b068136b6c1", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "containerStartTime": "2025-10-31T05:16:10Z", "containerId": "af8a0cf14aa1"}, "alertInfo": {"alertId": "4cecd7a7-9648-41ff-af96-53cd925c792d", "lifecycleStage": "RUNTIME"}, "processInfo": {"processViolationId": "1619f084-0452-43f4-9b6d-46f6c65c6cc9", "processSignalId": "e9391246-b618-11f0-bf6b-0a580a830018", "processCreationTime": "2025-10-31T05:17:35.678145616Z", "processName": "curl", "processArgs": "http://127.0.0.1:10248/ --max-time 2", "execFilePath": "/usr/bin/curl", "pid": 61724, "processUid": 999, "processGid": 999}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "86804b96-e87e-4eae-b56e-1718a8a55763", "policyName": "Process Targeting Cluster Kubelet Endpoint", "policyDescription": "Detects misuse of the healthz/kubelet API/heapster endpoint", "policyRationale": "A pod communicating to a Kubernetes API from via command line is highly irregular", "policyCategories": ["Kubernetes"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:9, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.678145], [_time:2025-10-31T05:17:35.659+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'curl http://127.0.0.1:10248/ --max-time 2' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:3efc8639-7a67-500e-9491-8be447b608e5, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207792, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "3efc8639-7a67-500e-9491-8be447b608e5", "violationMessage": "Kubernetes API received exec 'curl http://127.0.0.1:10248/ --max-time 2' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "curl http://127.0.0.1:10248/ --max-time 2"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:35.659398286Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:10, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.659398], [_time:2025-10-31T05:17:35.020+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:3e59f7db-8bcf-5074-ab43-bd126aa9c273, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:36943, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "3e59f7db-8bcf-5074-ab43-bd126aa9c273", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:35.020466225Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:11, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.020466], [_time:2025-10-31T05:17:34.838+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:20676a69-5fcf-5299-954d-f633bde47494, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37010, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "20676a69-5fcf-5299-954d-f633bde47494", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:34.838842722Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:12, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.838842], [_time:2025-10-31T05:17:34.516+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:06df3370-942f-5874-8618-c1444f7b2a15, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37077, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "06df3370-942f-5874-8618-c1444f7b2a15", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:34.516430442Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:13, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.516430], [_time:2025-10-31T05:17:28.144+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:120ddd13-2c61-58b9-a141-cf7b7191fe4d, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37144, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "120ddd13-2c61-58b9-a141-cf7b7191fe4d", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:17:28.144163920Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:14, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.144163], [_time:2025-10-31T05:16:51.999+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:b9329827-692a-5d3f-b327-df4126488749, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37211, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b9329827-692a-5d3f-b327-df4126488749", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:51.999322190Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:15, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.999322], [_time:2025-10-31T05:16:51.044+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:a14dcc58-e481-5ed9-ae9b-a37990042f44, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207868, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a14dcc58-e481-5ed9-ae9b-a37990042f44", "violationMessage": "Kubernetes API received exec 'sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:51.044484644Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:16, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.044484], [_time:2025-10-31T05:16:50.087+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:7fc2eb95-80ea-52c6-8a25-3d611f6fba00, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37278, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "7fc2eb95-80ea-52c6-8a25-3d611f6fba00", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:50.087513492Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:17, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.087513], [_time:2025-10-31T05:16:47.972+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:4c48b481-4f8b-5dfb-8790-d551f6530d1b, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37345, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "4c48b481-4f8b-5dfb-8790-d551f6530d1b", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.972332890Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:18, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.972332], [_time:2025-10-31T05:16:47.869+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; exit $e' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:5a9fd142-5975-5c2f-a769-d36341ab0132, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207946, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "5a9fd142-5975-5c2f-a769-d36341ab0132", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; exit $e' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar; exit $e"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.869826793Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:19, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.869826], [_time:2025-10-31T05:16:47.765+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar'' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:38c63ecd-1936-5897-9712-10c7e86044c2, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208030, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "38c63ecd-1936-5897-9712-10c7e86044c2", "violationMessage": "Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar'' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar'"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.765808014Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:20, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.765808], [_time:2025-10-31T05:16:47.590+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar' && echo $?' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:3c492b4f-fee8-5cc5-96bf-247f55eb08e8, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208108, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "3c492b4f-fee8-5cc5-96bf-247f55eb08e8", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar' && echo $?' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b76.tar' && echo $?"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.590607395Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:21, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.590607], [_time:2025-10-31T05:16:47.489+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; exit $e' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:88aae80b-5d66-5f94-95b3-2f22ce1d8b90, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208188, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "88aae80b-5d66-5f94-95b3-2f22ce1d8b90", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; exit $e' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar; exit $e"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.489204126Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:22, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.489204], [_time:2025-10-31T05:16:47.392+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar'' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:3f6c6501-f181-5fa7-8dd4-122e994b2598, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208272, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "3f6c6501-f181-5fa7-8dd4-122e994b2598", "violationMessage": "Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar'' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar'"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.392649860Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:23, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.392649], [_time:2025-10-31T05:16:47.150+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar' && echo $?' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:c0d38ef6-ebf9-5ede-b41f-f80c5aa79262, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv/splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:208350, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "c0d38ef6-ebf9-5ede-b41f-f80c5aa79262", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar' && echo $?' request into pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "container", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b4b.tar' && echo $?"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:47.150668427Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv", "containerName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "alertInfo": {"alertId": "f296b200-9265-4f25-8a7e-31c94d878d66", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:24, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.150668], [_time:2025-10-31T05:16:43.804+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:85775d08-f0a6-5e74-8217-9de6c7c6fbda, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37412, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "85775d08-f0a6-5e74-8217-9de6c7c6fbda", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:43.804403445Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:25, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.804403], [_time:2025-10-31T05:16:33.707+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:0fcf88e1-5928-520e-ac62-d310e9271350, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37479, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "0fcf88e1-5928-520e-ac62-d310e9271350", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:33.707458371Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:26, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.707458], [_time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' allows privilege escalation, id:82f66213-cb0d-438c-ba00-7ca5478dc515, signature:Alerts if a deployment has containers with allowPrivilegeEscalation set to true in its security context., src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Container with privilege escalation allowed, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:107431, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "82f66213-cb0d-438c-ba00-7ca5478dc515", "violationMessage": "Container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' allows privilege escalation", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070429425Z"}, "alertInfo": {"alertId": "82f66213-cb0d-438c-ba00-7ca5478dc515", "alertFirstOccurred": "2025-10-31T05:16:32.070429425Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "16c95922-08c4-41b6-a721-dc4b2a806632", "policyName": "Container with privilege escalation allowed", "policyDescription": "Alerts if a deployment has containers with allowPrivilegeEscalation set to true in its security context.", "policyRationale": "A container process can run with more privileges than its parent process if the container's security context has the boolean setting allowPrivilegeEscalation enabled. In Kubernetes pods, this setting is true by default. Set the value to false if the pod is to run as a non-root user.", "policyCategories": ["Privileges", "Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:27, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070429], [_time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:CPU request set to 0 cores for container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' Memory limit set to 0 MB for container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:5d958a3d-b274-4149-9e22-678b7ba8406d, signature:Alert on deployments that have containers without CPU request or memory limit, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:No CPU request or memory limit specified, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:76745, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "5d958a3d-b274-4149-9e22-678b7ba8406d", "violationMessage": "CPU request set to 0 cores for container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'\nMemory limit set to 0 MB for container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070409464Z"}, "alertInfo": {"alertId": "5d958a3d-b274-4149-9e22-678b7ba8406d", "alertFirstOccurred": "2025-10-31T05:16:32.070409464Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "886c3c94-3a6a-4f2b-82fc-d6bf5a310840", "policyName": "No CPU request or memory limit specified", "policyDescription": "Alert on deployments that have containers without CPU request or memory limit", "policyRationale": "A container without a specified CPU request may be starved for CPU time, while a container without a specified memory limit may cause the host to become over-provisioned.", "policyCategories": ["Devops Best Practices", "Docker Cis"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:28, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070409], [_time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Deployment mounts the service account tokens. Namespace has name 'qa-splunk' Service Account is set to 'default', id:be23906d-3128-43a1-8339-7c5daad85d30, signature:Protect pod default service account tokens from compromise by minimizing the mounting of the default service account token to only those pods whose application requires interaction with the Kubernetes API., src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Pod Service Account Token Automatically Mounted, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:161215, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "be23906d-3128-43a1-8339-7c5daad85d30", "violationMessage": "Deployment mounts the service account tokens.\nNamespace has name 'qa-splunk'\nService Account is set to 'default'", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070240100Z"}, "alertInfo": {"alertId": "be23906d-3128-43a1-8339-7c5daad85d30", "alertFirstOccurred": "2025-10-31T05:16:32.070240100Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "fb8f8732-c31d-496b-8fb1-d5abe6056e27", "policyName": "Pod Service Account Token Automatically Mounted", "policyDescription": "Protect pod default service account tokens from compromise by minimizing the mounting of the default service account token to only those pods whose application requires interaction with the Kubernetes API.", "policyRationale": "By default, Kubernetes automatically provisions a service account for each pod and mounts the secret at runtime. This service account is not typically used. If this pod is compromised and the compromised user has access to the service account, the service account could be used to escalate privileges within the cluster. To reduce the likelihood of privilege escalation this service account should not be mounted by default unless the pod requires direct access to the Kubernetes API as part of the pods functionality.", "policyCategories": ["Privileges", "Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:29, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070240], [_time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Environment variable 'SPLUNK_PASSWORD' is present in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', id:0ce2dfee-80f3-48fe-899e-3e00291c91e0, signature:Alert on deployments with environment variables that contain 'SECRET', src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Environment Variable Contains Secret, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:9817, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "0ce2dfee-80f3-48fe-899e-3e00291c91e0", "violationMessage": "Environment variable 'SPLUNK_PASSWORD' is present in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520'", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070160968Z"}, "alertInfo": {"alertId": "0ce2dfee-80f3-48fe-899e-3e00291c91e0", "alertFirstOccurred": "2025-10-31T05:16:32.070160968Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "f4996314-c3d7-4553-803b-b24ce7febe48", "policyName": "Environment Variable Contains Secret", "policyDescription": "Alert on deployments with environment variables that contain 'SECRET'", "policyRationale": "Using secrets in environment variables may allow inspection into your secrets from the host or even through the orchestrator UI.", "policyCategories": ["Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:30, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070160], [_time:2025-10-31T05:16:32.070+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' includes component 'microdnf' (version 3.8.0-2.el8.x86_64) Container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' includes component 'rpm' (version 4.14.3-26.el8.x86_64), id:064ae5a8-deb1-4779-b793-9da140f841a3, signature:Alert on deployments with components of the Red Hat/Fedora/CentOS package management system., src_type:Deployment, app:stackrox, dest:unknown, severity:low, signature_id:Red Hat Package Manager in Image, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:5747, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "064ae5a8-deb1-4779-b793-9da140f841a3", "violationMessage": "Container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' includes component 'microdnf' (version 3.8.0-2.el8.x86_64)\nContainer 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' includes component 'rpm' (version 4.14.3-26.el8.x86_64)", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.070054845Z"}, "alertInfo": {"alertId": "064ae5a8-deb1-4779-b793-9da140f841a3", "alertFirstOccurred": "2025-10-31T05:16:32.070054845Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "f95ff08d-130a-465a-a27e-32ed1fb05555", "policyName": "Red Hat Package Manager in Image", "policyDescription": "Alert on deployments with components of the Red Hat/Fedora/CentOS package management system.", "policyRationale": "Package managers make it easier for attackers to use compromised containers, since they can easily add software.", "policyCategories": ["Security Best Practices"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "LOW_SEVERITY", "policyVersion": "1.1"}}, _serial:31, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.070054], [_time:2025-10-31T05:16:32.069+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' has image created at 2023-06-03 01:21:18 (UTC), id:fd02d1e5-c03d-42b2-b1f4-a362d17bfeb5, signature:Alert on deployments with images that haven't been updated in 90 days, src_type:Deployment, app:stackrox, dest:unknown, severity:low, signature_id:90-Day Image Age, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:218439, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "fd02d1e5-c03d-42b2-b1f4-a362d17bfeb5", "violationMessage": "Container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520' has image created at 2023-06-03 01:21:18 (UTC)", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.069470589Z"}, "alertInfo": {"alertId": "fd02d1e5-c03d-42b2-b1f4-a362d17bfeb5", "alertFirstOccurred": "2025-10-31T05:16:32.069470589Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "2db9a279-2aec-4618-a85d-7f1bdf4911b1", "policyName": "90-Day Image Age", "policyDescription": "Alert on deployments with images that haven't been updated in 90 days", "policyRationale": "Base images are updated frequently with bug fixes and vulnerability patches. Image age exceeding 90 days may indicate a higher risk of vulnerabilities existing in the image.", "policyCategories": ["Devops Best Practices", "Security Best Practices", "Supply Chain Security"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "LOW_SEVERITY", "policyVersion": "1.1"}}, _serial:32, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.069470], [_time:2025-10-31T05:16:32.069+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Fixable CVE-2019-16942 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.1 Fixable CVE-2019-16943 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.1 Fixable CVE-2019-17531 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.1 Fixable CVE-2019-20330 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.2 Fixable CVE-2020-10650 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4 Fixable CVE-2020-10672 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4 Fixable CVE-2020-10673 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4 Fixable CVE-2020-10968 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4 Fixable CVE-2020-10969 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4 Fixable CVE-2020-11111 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4 Fixable CVE-2020-11112 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4 Fixable CVE-2020-11113 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4 Fixable CVE-2020-11619 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4 Fixable CVE-2020-11620 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4 Fixable CVE-2020-13949 (CVSS 7.5) (severity Important) found in component 'hive' (version 3.1.3) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 4.0.0 Fixable CVE-2020-14060 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5 Fixable CVE-2020-14061 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5 Fixable CVE-2020-14062 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5 Fixable CVE-2020-14195 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5 Fixable CVE-2020-24616 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.6 Fixable CVE-2020-24750 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.6 Fixable CVE-2020-25649 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.7 Fixable CVE-2020-35490 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-35491 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-35728 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-36179 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-36180 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-36181 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-36182 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-36183 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-36184 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-36185 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-36186 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-36187 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-36188 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-36189 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8 Fixable CVE-2020-36518 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.12.6.1 Fixable CVE-2020-8840 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.3 Fixable CVE-2020-9546 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4 Fixable CVE-2020-9547 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4 Fixable CVE-2020-9548 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4 Fixable CVE-2021-20190 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.7 Fixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2019.6.16) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2022.12.7 Fixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2022.9.24) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2022.12.7 Fixable CVE-2022-3171 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 3.16.3 Fixable CVE-2022-42003 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.12.7.1 Fixable CVE-2022-42004 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.12.7.1 Fixable CVE-2023-0341 (CVSS 7.8) (severity Important) found in component 'editorconfig' (version 0.12.3) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0.12.6 Fixable CVE-2023-2976 (CVSS 7.1) (severity Important) found in component 'guava' (version 11.0.2) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 32.0.0 Fixable CVE-2023-37920 (CVSS 9.8) (severity Critical) found in component 'certifi' (version 2019.6.16) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2023.7.22 Fixable CVE-2023-38325 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 41.0.2 Fixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.12) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.26.17 Fixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.6) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.26.17 Fixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 2.0.2) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.0.6 Fixable CVE-2023-49083 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 41.0.6 Fixable CVE-2023-50782 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 42.0.0 Fixable CVE-2024-26130 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 42.0.4 Fixable CVE-2024-7254 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 3.25.5 Fixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.10.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.15.2 Fixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.11.2) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.15.2 Fixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 47.1.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 78.1.1 Fixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 67.8.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 78.1.1 Fixable CVE-2025-47436 (CVSS 9.8) (severity Critical) found in component 'orc' (version 1.5.8) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.8.9 Fixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-25.el8_8 Fixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-25.el8_8 Fixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.1 Fixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.1 Fixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6 Fixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6 Fixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6 Fixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6 Fixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6 Fixable RHSA-2023:5837 (CVSS 7.5) (severity Important) found in component 'libnghttp2' (version 1.33.0-3.el8_2.1.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.33.0-5.el8_8 Fixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.2 Fixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.2 Fixable RHSA-2024:10379 (CVSS 7.4) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.3.1-36.el8_10 Fixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13 Fixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13 Fixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13 Fixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13 Fixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13 Fixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1 Fixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1 Fixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1 Fixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1 Fixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1 Fixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2 Fixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2 Fixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2 Fixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2 Fixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2 Fixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-62.el8_10 Fixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-62.el8_10 Fixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'platform-python-setuptools' (version 39.2.0-7.el8.noarch) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:39.2.0-8.el8_10 Fixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'python3-setuptools-wheel' (version 39.2.0-7.el8.noarch) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:39.2.0-8.el8_10 Fixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-30.el8_10 Fixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-30.el8_10 Fixable RHSA-2025:10027 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.3.1-37.el8_10 Fixable RHSA-2025:10110 (CVSS 7) (severity Important) found in component 'sudo' (version 1.8.29-10.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.9.5p2-1.el8_10.1 Fixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-70.el8_10 Fixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-70.el8_10 Fixable RHSA-2025:10698 (CVSS 9.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.9.7-21.el8_10.1 Fixable RHSA-2025:12010 (CVSS 7.7) (severity Important) found in component 'sqlite-libs' (version 3.26.0-17.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.26.0-20.el8_10 Fixable RHSA-2025:12450 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.9.7-21.el8_10.2 Fixable RHSA-2025:14135 (CVSS 7.3) (severity Important) found in component 'libarchive' (version 3.3.3-5.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.3.3-6.el8_10 Fixable RHSA-2025:14557 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.3.1-38.el8_10 Fixable RHSA-2025:2686 (CVSS 8.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.9.7-19.el8_10, id:a7e813dc-e164-4fa2-851b-2ddc49981d96, signature:Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Fixable Severity at least Important, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:140656, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a7e813dc-e164-4fa2-851b-2ddc49981d96", "violationMessage": "Fixable CVE-2019-16942 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.1\nFixable CVE-2019-16943 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.1\nFixable CVE-2019-17531 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.1\nFixable CVE-2019-20330 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.2\nFixable CVE-2020-10650 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-10672 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-10673 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-10968 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-10969 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11111 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11112 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11113 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11619 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-11620 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-13949 (CVSS 7.5) (severity Important) found in component 'hive' (version 3.1.3) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 4.0.0\nFixable CVE-2020-14060 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5\nFixable CVE-2020-14061 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5\nFixable CVE-2020-14062 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5\nFixable CVE-2020-14195 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.5\nFixable CVE-2020-24616 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.6\nFixable CVE-2020-24750 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.6\nFixable CVE-2020-25649 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.7\nFixable CVE-2020-35490 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-35491 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-35728 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36179 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36180 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36181 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36182 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36183 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36184 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36185 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36186 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36187 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36188 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36189 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.8\nFixable CVE-2020-36518 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.12.6.1\nFixable CVE-2020-8840 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.3\nFixable CVE-2020-9546 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-9547 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2020-9548 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.4\nFixable CVE-2021-20190 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.9.10.7\nFixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2019.6.16) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2022.12.7\nFixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2022.9.24) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2022.12.7\nFixable CVE-2022-3171 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 3.16.3\nFixable CVE-2022-42003 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.12.7.1\nFixable CVE-2022-42004 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.12.7.1\nFixable CVE-2023-0341 (CVSS 7.8) (severity Important) found in component 'editorconfig' (version 0.12.3) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0.12.6\nFixable CVE-2023-2976 (CVSS 7.1) (severity Important) found in component 'guava' (version 11.0.2) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 32.0.0\nFixable CVE-2023-37920 (CVSS 9.8) (severity Critical) found in component 'certifi' (version 2019.6.16) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2023.7.22\nFixable CVE-2023-38325 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 41.0.2\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.12) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.26.17\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.6) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.26.17\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 2.0.2) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 2.0.6\nFixable CVE-2023-49083 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 41.0.6\nFixable CVE-2023-50782 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 42.0.0\nFixable CVE-2024-26130 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 42.0.4\nFixable CVE-2024-7254 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 3.25.5\nFixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.10.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.15.2\nFixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.11.2) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.15.2\nFixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 47.1.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 78.1.1\nFixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 67.8.0) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 78.1.1\nFixable CVE-2025-47436 (CVSS 9.8) (severity Critical) found in component 'orc' (version 1.5.8) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 1.8.9\nFixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-25.el8_8\nFixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-25.el8_8\nFixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.1\nFixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.1\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5837 (CVSS 7.5) (severity Important) found in component 'libnghttp2' (version 1.33.0-3.el8_2.1.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.33.0-5.el8_8\nFixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.2\nFixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-51.el8_8.2\nFixable RHSA-2024:10379 (CVSS 7.4) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.3.1-36.el8_10\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-62.el8_10\nFixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-62.el8_10\nFixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'platform-python-setuptools' (version 39.2.0-7.el8.noarch) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:39.2.0-8.el8_10\nFixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'python3-setuptools-wheel' (version 39.2.0-7.el8.noarch) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:39.2.0-8.el8_10\nFixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-30.el8_10\nFixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.18.2-30.el8_10\nFixable RHSA-2025:10027 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.3.1-37.el8_10\nFixable RHSA-2025:10110 (CVSS 7) (severity Important) found in component 'sudo' (version 1.8.29-10.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.9.5p2-1.el8_10.1\nFixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-70.el8_10\nFixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.6.8-70.el8_10\nFixable RHSA-2025:10698 (CVSS 9.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.9.7-21.el8_10.1\nFixable RHSA-2025:12010 (CVSS 7.7) (severity Important) found in component 'sqlite-libs' (version 3.26.0-17.el8_7.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.26.0-20.el8_10\nFixable RHSA-2025:12450 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.9.7-21.el8_10.2\nFixable RHSA-2025:14135 (CVSS 7.3) (severity Important) found in component 'libarchive' (version 3.3.3-5.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:3.3.3-6.el8_10\nFixable RHSA-2025:14557 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:1.3.1-38.el8_10\nFixable RHSA-2025:2686 (CVSS 8.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520', resolved by version 0:2.9.7-19.el8_10", "violationType": "GENERIC", "violationTime": "2025-10-31T05:16:32.069385696Z"}, "alertInfo": {"alertId": "a7e813dc-e164-4fa2-851b-2ddc49981d96", "alertFirstOccurred": "2025-10-31T05:16:32.069385696Z"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "a919ccaf-6b43-4160-ac5d-a405e1440a41", "policyName": "Fixable Severity at least Important", "policyDescription": "Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important", "policyRationale": "Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s).", "policyCategories": ["Vulnerability Management"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:33, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.069385], [_time:2025-10-31T05:16:23.639+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:24e469b6-67fb-56de-ada2-0f84d074195b, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37546, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "24e469b6-67fb-56de-ada2-0f84d074195b", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:23.639385445Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:34, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.639385], [_time:2025-10-31T05:16:13.563+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089', id:75f2829a-79b8-5056-a135-a060dfb82ef8, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 > splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:37613, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "75f2829a-79b8-5056-a135-a060dfb82ef8", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-10-31T05:16:13.563027882Z", "podId": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv"}, "alertInfo": {"alertId": "30271d71-ab97-4061-a5ec-44a9b61b9886", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "84f0382b-0e6d-4122-9fe3-2f02374c8f60", "deploymentName": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "9db27edc-c375-4bad-87ba-6c09f5710b87", "deploymentLabels": {"app": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520", "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:35, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.563027], [_time:2025-10-31T05:13:58.751+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69)., id:d6827df1-4090-402a-a132-0d6cd44c5665, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-sigstore, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:181394, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "d6827df1-4090-402a-a132-0d6cd44c5665", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.751223610Z"}, "alertInfo": {"alertId": "d6827df1-4090-402a-a132-0d6cd44c5665", "alertFirstOccurred": "2025-10-31T05:13:58.751223610Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:36, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.751223], [_time:2025-10-31T05:13:58.526+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057)., id:a0ef76c5-1cb9-4ac7-9338-d75de5cf0128, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:134815, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a0ef76c5-1cb9-4ac7-9338-d75de5cf0128", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.526414594Z"}, "alertInfo": {"alertId": "a0ef76c5-1cb9-4ac7-9338-d75de5cf0128", "alertFirstOccurred": "2025-10-31T05:13:58.526414594Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:37, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.526414], [_time:2025-10-31T05:13:58.526+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057)., id:bcbb941b-f112-4220-8b79-fc1f2a86cbd5, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:160667, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "bcbb941b-f112-4220-8b79-fc1f2a86cbd5", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.526391463Z"}, "alertInfo": {"alertId": "bcbb941b-f112-4220-8b79-fc1f2a86cbd5", "alertFirstOccurred": "2025-10-31T05:13:58.526391463Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:38, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.526391], [_time:2025-10-31T05:13:58.521+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057)., id:4b3720ea-b24d-48a3-af7a-19189db42181, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:61662, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "4b3720ea-b24d-48a3-af7a-19189db42181", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.521906811Z"}, "alertInfo": {"alertId": "4b3720ea-b24d-48a3-af7a-19189db42181", "alertFirstOccurred": "2025-10-31T05:13:58.521906811Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:39, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.521906], [_time:2025-10-31T05:13:58.521+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057)., id:b22bf77b-fbb6-4c1f-9015-60de3bc86aa3, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:150980, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b22bf77b-fbb6-4c1f-9015-60de3bc86aa3", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.521870920Z"}, "alertInfo": {"alertId": "b22bf77b-fbb6-4c1f-9015-60de3bc86aa3", "alertFirstOccurred": "2025-10-31T05:13:58.521870920Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:40, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.521870], [_time:2025-10-31T05:13:58.508+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:301f5e00-6448-4ba5-9e3e-4c4dd76d6940, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:36897, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "301f5e00-6448-4ba5-9e3e-4c4dd76d6940", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.508932907Z"}, "alertInfo": {"alertId": "301f5e00-6448-4ba5-9e3e-4c4dd76d6940", "alertFirstOccurred": "2025-10-31T05:13:58.508932907Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:41, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.508932], [_time:2025-10-31T05:13:58.508+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:81d8cc6a-5dfb-4700-bcfa-32b8f6491a9f, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:106546, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "81d8cc6a-5dfb-4700-bcfa-32b8f6491a9f", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.508911087Z"}, "alertInfo": {"alertId": "81d8cc6a-5dfb-4700-bcfa-32b8f6491a9f", "alertFirstOccurred": "2025-10-31T05:13:58.508911087Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:42, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.508911], [_time:2025-10-31T05:13:58.502+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:56f57eae-d48c-48b6-9c32-88a702b2039b, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:72369, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "56f57eae-d48c-48b6-9c32-88a702b2039b", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.502763149Z"}, "alertInfo": {"alertId": "56f57eae-d48c-48b6-9c32-88a702b2039b", "alertFirstOccurred": "2025-10-31T05:13:58.502763149Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:43, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.502763], [_time:2025-10-31T05:13:58.502+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:a144ac21-00ad-4e5f-a63f-17875fb8e557, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:135171, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a144ac21-00ad-4e5f-a63f-17875fb8e557", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.502724608Z"}, "alertInfo": {"alertId": "a144ac21-00ad-4e5f-a63f-17875fb8e557", "alertFirstOccurred": "2025-10-31T05:13:58.502724608Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:44, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.502724], [_time:2025-10-31T05:13:58.495+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:b387f52f-7df2-4020-8fd3-acc11115d7c1, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:152598, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b387f52f-7df2-4020-8fd3-acc11115d7c1", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.495986315Z"}, "alertInfo": {"alertId": "b387f52f-7df2-4020-8fd3-acc11115d7c1", "alertFirstOccurred": "2025-10-31T05:13:58.495986315Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:45, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.495986], [_time:2025-10-31T05:13:58.495+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:ee163879-62e0-4af9-a360-5cd1719305d4, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:203113, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "ee163879-62e0-4af9-a360-5cd1719305d4", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.495973314Z"}, "alertInfo": {"alertId": "ee163879-62e0-4af9-a360-5cd1719305d4", "alertFirstOccurred": "2025-10-31T05:13:58.495973314Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:46, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.495973], [_time:2025-10-31T05:13:58.495+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:76b96af2-5b4d-4e16-a910-e8221a6d1a8d, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:95289, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "76b96af2-5b4d-4e16-a910-e8221a6d1a8d", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.495696527Z"}, "alertInfo": {"alertId": "76b96af2-5b4d-4e16-a910-e8221a6d1a8d", "alertFirstOccurred": "2025-10-31T05:13:58.495696527Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:47, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.495696], [_time:2025-10-31T05:13:58.495+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:9ec938d0-4cb9-4da0-908c-476db46cafad, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:132228, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "9ec938d0-4cb9-4da0-908c-476db46cafad", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.495677136Z"}, "alertInfo": {"alertId": "9ec938d0-4cb9-4da0-908c-476db46cafad", "alertFirstOccurred": "2025-10-31T05:13:58.495677136Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:48, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.495677], [_time:2025-10-31T05:13:58.466+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:f0d4371a-b218-4343-9ca4-d7d266dd6443, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:205362, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "f0d4371a-b218-4343-9ca4-d7d266dd6443", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.466810139Z"}, "alertInfo": {"alertId": "f0d4371a-b218-4343-9ca4-d7d266dd6443", "alertFirstOccurred": "2025-10-31T05:13:58.466810139Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:49, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.466810], [_time:2025-10-31T05:13:58.466+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:27428ec2-09ae-4240-84ac-8fa3fb33ab53, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:28665, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "27428ec2-09ae-4240-84ac-8fa3fb33ab53", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.466786819Z"}, "alertInfo": {"alertId": "27428ec2-09ae-4240-84ac-8fa3fb33ab53", "alertFirstOccurred": "2025-10-31T05:13:58.466786819Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:50, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.466786], [_time:2025-10-31T05:13:58.466+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:dfde9d7e-1133-4783-adfe-8143516f0f21, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:192528, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "dfde9d7e-1133-4783-adfe-8143516f0f21", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.466263825Z"}, "alertInfo": {"alertId": "dfde9d7e-1133-4783-adfe-8143516f0f21", "alertFirstOccurred": "2025-10-31T05:13:58.466263825Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:51, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.466263], [_time:2025-10-31T05:13:58.466+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:33b9daaf-4573-413a-8a75-8839aa9aa474, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:41295, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "33b9daaf-4573-413a-8a75-8839aa9aa474", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.466249774Z"}, "alertInfo": {"alertId": "33b9daaf-4573-413a-8a75-8839aa9aa474", "alertFirstOccurred": "2025-10-31T05:13:58.466249774Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:52, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.466249], [_time:2025-10-31T05:13:58.457+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861)., id:f27a8ce8-9d36-4f07-afd8-a55b78b4b3e3, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207500, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "f27a8ce8-9d36-4f07-afd8-a55b78b4b3e3", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.457620029Z"}, "alertInfo": {"alertId": "f27a8ce8-9d36-4f07-afd8-a55b78b4b3e3", "alertFirstOccurred": "2025-10-31T05:13:58.457620029Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:53, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.457620], [_time:2025-10-31T05:13:58.457+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861)., id:ff4a6ee6-e43d-427b-92a4-dc3a768ddce7, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:220126, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "ff4a6ee6-e43d-427b-92a4-dc3a768ddce7", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.457607209Z"}, "alertInfo": {"alertId": "ff4a6ee6-e43d-427b-92a4-dc3a768ddce7", "alertFirstOccurred": "2025-10-31T05:13:58.457607209Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:54, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.457607], [_time:2025-10-31T05:13:58.457+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861)., id:0075e051-2154-4ce5-8c6b-20098e70cb2b, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:120, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "0075e051-2154-4ce5-8c6b-20098e70cb2b", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.457428114Z"}, "alertInfo": {"alertId": "0075e051-2154-4ce5-8c6b-20098e70cb2b", "alertFirstOccurred": "2025-10-31T05:13:58.457428114Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:55, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.457428], [_time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06)., id:13892ab4-79c1-47de-87ec-ee6cd3d93fc4, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:byopki, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:13211, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "13892ab4-79c1-47de-87ec-ee6cd3d93fc4", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451767480Z"}, "alertInfo": {"alertId": "13892ab4-79c1-47de-87ec-ee6cd3d93fc4", "alertFirstOccurred": "2025-10-31T05:13:58.451767480Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:56, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451767], [_time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06)., id:80f21a2f-4621-4559-aa6e-c273d43abf0d, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:byopki, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:106056, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "80f21a2f-4621-4559-aa6e-c273d43abf0d", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451622786Z"}, "alertInfo": {"alertId": "80f21a2f-4621-4559-aa6e-c273d43abf0d", "alertFirstOccurred": "2025-10-31T05:13:58.451622786Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "9391c0a1-c518-45a6-a0ee-77be05f97722", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:57, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451622], [_time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06)., id:7bad106e-8cc0-40bc-ae04-b1449d4e138e, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:byopki, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:101961, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "7bad106e-8cc0-40bc-ae04-b1449d4e138e", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451543203Z"}, "alertInfo": {"alertId": "7bad106e-8cc0-40bc-ae04-b1449d4e138e", "alertFirstOccurred": "2025-10-31T05:13:58.451543203Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:58, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451543], [_time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06)., id:29f0ff1f-2ae6-4246-bd01-9e1652f3d4c9, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:byopki, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:31097, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "29f0ff1f-2ae6-4246-bd01-9e1652f3d4c9", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451496922Z"}, "alertInfo": {"alertId": "29f0ff1f-2ae6-4246-bd01-9e1652f3d4c9", "alertFirstOccurred": "2025-10-31T05:13:58.451496922Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:59, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451496], [_time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812)., id:aff2b9da-b7d3-4554-b131-7e0a7126894c, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-tekton, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:148828, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "aff2b9da-b7d3-4554-b131-7e0a7126894c", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451168863Z"}, "alertInfo": {"alertId": "aff2b9da-b7d3-4554-b131-7e0a7126894c", "alertFirstOccurred": "2025-10-31T05:13:58.451168863Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:60, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451168], [_time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812)., id:df935c74-3eec-41cb-857f-faf8e1368c50, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-tekton, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:192246, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "df935c74-3eec-41cb-857f-faf8e1368c50", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451155243Z"}, "alertInfo": {"alertId": "df935c74-3eec-41cb-857f-faf8e1368c50", "alertFirstOccurred": "2025-10-31T05:13:58.451155243Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:61, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451155], [_time:2025-10-31T05:13:58.451+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812)., id:2360d6f7-a467-4edd-af03-e0675d93f798, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-tekton, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:25453, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "2360d6f7-a467-4edd-af03-e0675d93f798", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.451000149Z"}, "alertInfo": {"alertId": "2360d6f7-a467-4edd-af03-e0675d93f798", "alertFirstOccurred": "2025-10-31T05:13:58.451000149Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:62, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.451000], [_time:2025-10-31T05:13:58.427+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69)., id:c69f9f6c-1649-4e83-b3ab-320a9638e29c, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-sigstore, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:168909, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "c69f9f6c-1649-4e83-b3ab-320a9638e29c", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.427505088Z"}, "alertInfo": {"alertId": "c69f9f6c-1649-4e83-b3ab-320a9638e29c", "alertFirstOccurred": "2025-10-31T05:13:58.427505088Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:63, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.427505], [_time:2025-10-31T05:13:58.427+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69)., id:f2779edc-ece1-4b52-8d5c-1152e324e7a7, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-sigstore, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:207449, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "f2779edc-ece1-4b52-8d5c-1152e324e7a7", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.427324234Z"}, "alertInfo": {"alertId": "f2779edc-ece1-4b52-8d5c-1152e324e7a7", "alertFirstOccurred": "2025-10-31T05:13:58.427324234Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:64, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.427324], [_time:2025-10-31T05:13:58.427+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69)., id:881f9e9f-aeb4-4b32-a04b-7b1093270b54, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:keyless-sigstore, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:111677, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "881f9e9f-aeb4-4b32-a04b-7b1093270b54", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.427309693Z"}, "alertInfo": {"alertId": "881f9e9f-aeb4-4b32-a04b-7b1093270b54", "alertFirstOccurred": "2025-10-31T05:13:58.427309693Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:65, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.427309], [_time:2025-10-31T05:13:58.396+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6)., id:815641b4-4df0-4e85-8054-f15f51cea5d9, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-distroless, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:106279, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "815641b4-4df0-4e85-8054-f15f51cea5d9", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.396493463Z"}, "alertInfo": {"alertId": "815641b4-4df0-4e85-8054-f15f51cea5d9", "alertFirstOccurred": "2025-10-31T05:13:58.396493463Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "f476cf3c-1e47-4895-9483-1b4b24cb7cca", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:66, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.396493], [_time:2025-10-31T05:13:58.396+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6)., id:e0a0f523-9ee7-4b69-ba3d-152b23808fbb, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-distroless, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:192990, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "e0a0f523-9ee7-4b69-ba3d-152b23808fbb", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.396480133Z"}, "alertInfo": {"alertId": "e0a0f523-9ee7-4b69-ba3d-152b23808fbb", "alertFirstOccurred": "2025-10-31T05:13:58.396480133Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "4771a410-edb6-47fc-9180-a0c957504700", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:67, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.396480], [_time:2025-10-31T05:13:58.151+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6)., id:a5274a54-99cf-4e49-93a4-ef72dda61508, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-distroless, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:138848, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "a5274a54-99cf-4e49-93a4-ef72dda61508", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.151846747Z"}, "alertInfo": {"alertId": "a5274a54-99cf-4e49-93a4-ef72dda61508", "alertFirstOccurred": "2025-10-31T05:13:58.151846747Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "1cea8cf5-1723-4b1c-8e5c-726a519a5213", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:68, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.151846], [_time:2025-10-31T05:13:58.151+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6)., id:37913315-f352-415d-b456-565dae08487c, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-distroless, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:43985, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "37913315-f352-415d-b456-565dae08487c", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.151790275Z"}, "alertInfo": {"alertId": "37913315-f352-415d-b456-565dae08487c", "alertFirstOccurred": "2025-10-31T05:13:58.151790275Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:69, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.151790], [_time:2025-10-31T05:13:58.151+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6)., id:25c6947a-ac7f-40d6-a3f1-eb0e2b618fe8, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-distroless, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:27722, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "25c6947a-ac7f-40d6-a3f1-eb0e2b618fe8", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.151691442Z"}, "alertInfo": {"alertId": "25c6947a-ac7f-40d6-a3f1-eb0e2b618fe8", "alertFirstOccurred": "2025-10-31T05:13:58.151691442Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:70, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.151691], [_time:2025-10-31T05:13:58.151+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6)., id:ac891fb9-6d13-4ed0-bffd-a7b887999790, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-distroless, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:145916, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "ac891fb9-6d13-4ed0-bffd-a7b887999790", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca and io.stackrox.signatureintegration.96fa09c0-8b9f-4e95-84eb-f07549c676d6).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.151522078Z"}, "alertInfo": {"alertId": "ac891fb9-6d13-4ed0-bffd-a7b887999790", "alertFirstOccurred": "2025-10-31T05:13:58.151522078Z"}, "deploymentInfo": {"deploymentId": "fa31a0c2-69d4-467c-b665-dd4e160c1037", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:71, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.151522], [_time:2025-10-31T05:13:58.108+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057)., id:4b67747c-7707-49ec-aea3-0e1e2236a863, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:61889, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "4b67747c-7707-49ec-aea3-0e1e2236a863", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.108093904Z"}, "alertInfo": {"alertId": "4b67747c-7707-49ec-aea3-0e1e2236a863", "alertFirstOccurred": "2025-10-31T05:13:58.108093904Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:72, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.108093], [_time:2025-10-31T05:13:58.107+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057)., id:74f3ce1f-5f29-4345-a2f4-7271e6861f8e, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:93970, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "74f3ce1f-5f29-4345-a2f4-7271e6861f8e", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.107602001Z"}, "alertInfo": {"alertId": "74f3ce1f-5f29-4345-a2f4-7271e6861f8e", "alertFirstOccurred": "2025-10-31T05:13:58.107602001Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:73, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.107602], [_time:2025-10-31T05:13:58.107+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057)., id:11730aab-5100-4e1c-a5d3-585b40af93a4, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:11969, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "11730aab-5100-4e1c-a5d3-585b40af93a4", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.b91d979f-742a-4ecd-9cfb-c28caac9f057).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.107574190Z"}, "alertInfo": {"alertId": "11730aab-5100-4e1c-a5d3-585b40af93a4", "alertFirstOccurred": "2025-10-31T05:13:58.107574190Z"}, "deploymentInfo": {"deploymentId": "9b6df366-4b92-4cf1-bb6b-d2df0a143dea", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:74, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.107574], [_time:2025-10-31T05:13:58.080+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:7105462f-255d-4e9c-9178-8d1b389b2d33, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:91705, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "7105462f-255d-4e9c-9178-8d1b389b2d33", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.080034610Z"}, "alertInfo": {"alertId": "7105462f-255d-4e9c-9178-8d1b389b2d33", "alertFirstOccurred": "2025-10-31T05:13:58.080034610Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:75, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.080034], [_time:2025-10-31T05:13:58.079+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:f60e42fd-e797-4063-99d0-701e24c16a6c, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:211041, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "f60e42fd-e797-4063-99d0-701e24c16a6c", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.079536136Z"}, "alertInfo": {"alertId": "f60e42fd-e797-4063-99d0-701e24c16a6c", "alertFirstOccurred": "2025-10-31T05:13:58.079536136Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:76, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.079536], [_time:2025-10-31T05:13:58.066+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861)., id:76319c34-df42-4f8c-ad82-5e63d03a3daa, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:94723, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "76319c34-df42-4f8c-ad82-5e63d03a3daa", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.066876771Z"}, "alertInfo": {"alertId": "76319c34-df42-4f8c-ad82-5e63d03a3daa", "alertFirstOccurred": "2025-10-31T05:13:58.066876771Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:77, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.066876], [_time:2025-10-31T05:13:58.066+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861)., id:b52395ee-3fa7-49ce-a132-a614d3f2f20d, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:154665, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b52395ee-3fa7-49ce-a132-a614d3f2f20d", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.066810569Z"}, "alertInfo": {"alertId": "b52395ee-3fa7-49ce-a132-a614d3f2f20d", "alertFirstOccurred": "2025-10-31T05:13:58.066810569Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:78, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.066810], [_time:2025-10-31T05:13:58.060+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:8ea73294-a233-4ae4-bf49-d67e19247270, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:117586, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "8ea73294-a233-4ae4-bf49-d67e19247270", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.060041595Z"}, "alertInfo": {"alertId": "8ea73294-a233-4ae4-bf49-d67e19247270", "alertFirstOccurred": "2025-10-31T05:13:58.060041595Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:79, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.060041], [_time:2025-10-31T05:13:58.059+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:69569c9f-bb69-4c64-be2d-0642a5acef18, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:84960, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "69569c9f-bb69-4c64-be2d-0642a5acef18", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.059452779Z"}, "alertInfo": {"alertId": "69569c9f-bb69-4c64-be2d-0642a5acef18", "alertFirstOccurred": "2025-10-31T05:13:58.059452779Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:80, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.059452], [_time:2025-10-31T05:13:58.056+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:0868047d-a546-4bbb-9abf-598195467aff, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:7240, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "0868047d-a546-4bbb-9abf-598195467aff", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.056040136Z"}, "alertInfo": {"alertId": "0868047d-a546-4bbb-9abf-598195467aff", "alertFirstOccurred": "2025-10-31T05:13:58.056040136Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:81, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.056040], [_time:2025-10-31T05:13:58.055+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:27ef184d-2f6b-4fbe-8a81-51316fc476a3, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:29657, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "27ef184d-2f6b-4fbe-8a81-51316fc476a3", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.055949203Z"}, "alertInfo": {"alertId": "27ef184d-2f6b-4fbe-8a81-51316fc476a3", "alertFirstOccurred": "2025-10-31T05:13:58.055949203Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:82, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.055949], [_time:2025-10-31T05:13:58.030+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06)., id:67b22c06-38d4-4e70-b12a-45b9d67680de, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:byopki, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:83810, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "67b22c06-38d4-4e70-b12a-45b9d67680de", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.43d12e96-38e8-412f-ae82-4ecf7bc57d3d, io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812, and io.stackrox.signatureintegration.cef971fe-062a-4d46-a8e8-d41e9b7e8e06).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.030998954Z"}, "alertInfo": {"alertId": "67b22c06-38d4-4e70-b12a-45b9d67680de", "alertFirstOccurred": "2025-10-31T05:13:58.030998954Z"}, "deploymentInfo": {"deploymentId": "75da064e-c931-4df6-93b7-ad2e03b93ca8", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:83, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.030998], [_time:2025-10-31T05:13:58.030+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69)., id:55194605-754b-4e41-bc08-449cc9f6577b, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:keyless-sigstore, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:70300, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "55194605-754b-4e41-bc08-449cc9f6577b", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.030591992Z"}, "alertInfo": {"alertId": "55194605-754b-4e41-bc08-449cc9f6577b", "alertFirstOccurred": "2025-10-31T05:13:58.030591992Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "c122c005-f30c-4ae8-abb5-8b1a761a655d", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:84, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.030591], [_time:2025-10-31T05:13:58.030+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69)., id:67d10c82-0de2-42fe-a42a-49115273c33d, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:keyless-sigstore, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:83922, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "67d10c82-0de2-42fe-a42a-49115273c33d", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.8646154c-35c2-4178-9d02-794d1a6d9d69).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.030500050Z"}, "alertInfo": {"alertId": "67d10c82-0de2-42fe-a42a-49115273c33d", "alertFirstOccurred": "2025-10-31T05:13:58.030500050Z"}, "deploymentInfo": {"deploymentId": "b44c0e22-c321-4b4e-8fe2-23224135f31d", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:85, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.030500], [_time:2025-10-31T05:13:58.024+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812)., id:6042064e-9afc-42ec-8e2b-6536812c3cd5, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-tekton, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:77956, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "6042064e-9afc-42ec-8e2b-6536812c3cd5", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.024935418Z"}, "alertInfo": {"alertId": "6042064e-9afc-42ec-8e2b-6536812c3cd5", "alertFirstOccurred": "2025-10-31T05:13:58.024935418Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "77558e07-a726-483d-ae0c-09caf25e2a1f", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:86, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.024935], [_time:2025-10-31T05:13:58.024+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812)., id:311c13c4-0c63-4eaf-9214-615603fe89b9, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-tekton, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:38512, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "311c13c4-0c63-4eaf-9214-615603fe89b9", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0eb0ccb8-cd83-4ce4-bcc1-04847f2bf755, io.stackrox.signatureintegration.63ec9357-1adf-4547-924b-fc0be75e92ca, and io.stackrox.signatureintegration.9a3620d2-1cdd-437e-8735-75c7ac103812).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:58.024901577Z"}, "alertInfo": {"alertId": "311c13c4-0c63-4eaf-9214-615603fe89b9", "alertFirstOccurred": "2025-10-31T05:13:58.024901577Z"}, "deploymentInfo": {"deploymentId": "8fc00462-9128-4c8b-be64-02025e63dd09", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:87, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.024901], [_time:2025-10-31T05:13:57.794+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:9cb523fe-afc2-4530-96e7-c81540ebf7e9, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:130207, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "9cb523fe-afc2-4530-96e7-c81540ebf7e9", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.794480868Z"}, "alertInfo": {"alertId": "9cb523fe-afc2-4530-96e7-c81540ebf7e9", "alertFirstOccurred": "2025-10-31T05:13:57.794480868Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:88, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.794480], [_time:2025-10-31T05:13:57.794+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:e797caf6-30f2-42a8-8f73-abafdd2581ac, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:197472, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "e797caf6-30f2-42a8-8f73-abafdd2581ac", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.794450637Z"}, "alertInfo": {"alertId": "e797caf6-30f2-42a8-8f73-abafdd2581ac", "alertFirstOccurred": "2025-10-31T05:13:57.794450637Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:89, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.794450], [_time:2025-10-31T05:13:57.794+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:b5db5345-2492-4a70-9691-933f9c330831, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Same+Digest, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:155199, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "b5db5345-2492-4a70-9691-933f9c330831", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.794291693Z"}, "alertInfo": {"alertId": "b5db5345-2492-4a70-9691-933f9c330831", "alertFirstOccurred": "2025-10-31T05:13:57.794291693Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "7bbb0491-044d-4e6a-b243-18e6e95a7e97", "policyName": "Same+Digest", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:90, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.794291], [_time:2025-10-31T05:13:57.789+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:54c22130-2641-4c3b-b906-d26d30e6e77d, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Wildcard, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:70072, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "54c22130-2641-4c3b-b906-d26d30e6e77d", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.789449281Z"}, "alertInfo": {"alertId": "54c22130-2641-4c3b-b906-d26d30e6e77d", "alertFirstOccurred": "2025-10-31T05:13:57.789449281Z"}, "deploymentInfo": {"deploymentId": "9dabf4c8-5270-4a1b-a39e-6c339c17cf7e", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "4fa22d38-9a23-4350-a219-313d081e88c0", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:91, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.789449], [_time:2025-10-31T05:13:57.789+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:19ac1ada-1fd8-451f-9c8f-e2339dbb0b0e, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Unverifiable, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:18039, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "19ac1ada-1fd8-451f-9c8f-e2339dbb0b0e", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.789054380Z"}, "alertInfo": {"alertId": "19ac1ada-1fd8-451f-9c8f-e2339dbb0b0e", "alertFirstOccurred": "2025-10-31T05:13:57.789054380Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:92, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.789054], [_time:2025-10-31T05:13:57.782+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:00c7f837-dbf0-4078-95a1-2fb781a5f303, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Wildcard, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:357, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "00c7f837-dbf0-4078-95a1-2fb781a5f303", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.782383979Z"}, "alertInfo": {"alertId": "00c7f837-dbf0-4078-95a1-2fb781a5f303", "alertFirstOccurred": "2025-10-31T05:13:57.782383979Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "4fa22d38-9a23-4350-a219-313d081e88c0", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:93, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.782383], [_time:2025-10-31T05:13:57.781+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:883dea6e-469a-4754-a579-d08cdeed6bcc, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:111918, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "883dea6e-469a-4754-a579-d08cdeed6bcc", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.781795552Z"}, "alertInfo": {"alertId": "883dea6e-469a-4754-a579-d08cdeed6bcc", "alertFirstOccurred": "2025-10-31T05:13:57.781795552Z"}, "deploymentInfo": {"deploymentId": "cfd75b0c-934a-40a9-b1c2-a63a46bb0226", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:94, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.781795], [_time:2025-10-31T05:13:57.780+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:837bb3ab-5e44-44a1-8887-c0fb57a95c72, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:107855, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "837bb3ab-5e44-44a1-8887-c0fb57a95c72", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.780456436Z"}, "alertInfo": {"alertId": "837bb3ab-5e44-44a1-8887-c0fb57a95c72", "alertFirstOccurred": "2025-10-31T05:13:57.780456436Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:95, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.780456], [_time:2025-10-31T05:13:57.780+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:5a9d48c9-1a85-4b63-bfef-23fb4ea934aa, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:74796, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "5a9d48c9-1a85-4b63-bfef-23fb4ea934aa", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.780433265Z"}, "alertInfo": {"alertId": "5a9d48c9-1a85-4b63-bfef-23fb4ea934aa", "alertFirstOccurred": "2025-10-31T05:13:57.780433265Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:96, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.780433], [_time:2025-10-31T05:13:57.780+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:60267079-4bd6-46f4-b141-4778d7b6462f, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Wildcard, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:77833, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "60267079-4bd6-46f4-b141-4778d7b6462f", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.780259461Z"}, "alertInfo": {"alertId": "60267079-4bd6-46f4-b141-4778d7b6462f", "alertFirstOccurred": "2025-10-31T05:13:57.780259461Z"}, "deploymentInfo": {"deploymentId": "20c4bb21-c2f9-4bce-88ea-414ba0d29700", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "4fa22d38-9a23-4350-a219-313d081e88c0", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:97, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.780259], [_time:2025-10-31T05:13:57.774+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861)., id:2802b8ae-0a00-49bc-be13-9a211fb4ffc1, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:29793, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "2802b8ae-0a00-49bc-be13-9a211fb4ffc1", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.774747491Z"}, "alertInfo": {"alertId": "2802b8ae-0a00-49bc-be13-9a211fb4ffc1", "alertFirstOccurred": "2025-10-31T05:13:57.774747491Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "0d77b0dd-edb5-47d3-987e-b86e405bc99e", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:98, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.774747], [_time:2025-10-31T05:13:57.774+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861)., id:74a8982a-b96c-4183-b42e-22331038d7da, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~62B74FF2-140F-4306-9A9D-2ECE9746FE0C, _cd:0:93720, _indextime:1761887904, _raw:{"violationInfo": {"violationId": "74a8982a-b96c-4183-b42e-22331038d7da", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.1a5a2f70-0998-4d77-a17c-07f6f2743861).", "violationType": "GENERIC", "violationTime": "2025-10-31T05:13:57.774725830Z"}, "alertInfo": {"alertId": "74a8982a-b96c-4183-b42e-22331038d7da", "alertFirstOccurred": "2025-10-31T05:13:57.774725830Z"}, "deploymentInfo": {"deploymentId": "9802f025-d552-4f78-b721-ad327e751d67", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "019f021e-1f45-4c62-be1b-800b809c82d5", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "c82067c8-51ad-4080-b8e4-2ab4baabf49e", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "9d56e9bf-38cf-4403-acd6-51adadc602b5", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:99, _si:[splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520-68d6748b8c-xgwfv, main], _sourcetype:stackrox-violations, _subsecond:.774725]] 05:19:49 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Current Splunk index contains any Network Alert: true and any Process Alert: true 05:19:49 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Validating CIM mappings for alerts 05:19:57 | DEBUG | IntegrationsSplunkViolati | Kubernetes | splunk-syslog-a6b4a138-dcc6-44a8-a157-6283ef8b4520: Service deleting... 05:19:57 | DEBUG | IntegrationsSplunkViolati | Kubernetes | splunk-syslog-a6b4a138-dcc6-44a8-a157-6283ef8b4520: Service deleted 05:19:57 | DEBUG | IntegrationsSplunkViolati | Kubernetes | splunk-collector-a6b4a138-dcc6-44a8-a157-6283ef8b4520: Service deleting... 05:19:57 | DEBUG | IntegrationsSplunkViolati | Kubernetes | splunk-collector-a6b4a138-dcc6-44a8-a157-6283ef8b4520: Service deleted 05:19:57 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Removed the deployment: splunk-a6b4a138-dcc6-44a8-a157-6283ef8b4520 05:19:57 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Ending testcase IntegrationsSplunkViolationsTest > Verify Splunk violations: StackRox violations reach Splunk TA PASSED IntegrationsSplunkViolationsTest STANDARD_OUT 05:19:57 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Waiting for namespace qa-splunk to be deleted 05:19:57 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:20:00 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:20:03 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:20:06 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:20:09 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:20:12 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:20:15 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:20:18 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:20:21 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:20:24 | DEBUG | IntegrationsSplunkViolati | Kubernetes | K8s found that namespace qa-splunk was deleted 05:20:24 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Ending testsuite 05:20:25 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Checking if cluster is healthy after test 05:20:25 | DEBUG | IntegrationsSplunkViolati | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries IntegrationsTest STANDARD_OUT 05:20:25 | INFO | IntegrationsTest | IntegrationsTest | Starting testsuite 05:20:25 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:20:25 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace netpol-notification-test-deployment 05:20:25 | DEBUG | IntegrationsTest | Kubernetes | Waiting for netpol-notification-test-deployment to start 05:20:25 | DEBUG | IntegrationsTest | Kubernetes | Status of netpol-notification-test-deployment's pods: 05:20:25 | DEBUG | IntegrationsTest | Kubernetes | - netpol-notification-test-deployment-86c44587f-j45m5 Container status: [] 05:20:25 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for netpol-notification-test-deployment 05:20:28 | DEBUG | IntegrationsTest | Kubernetes | Waiting for netpol-notification-test-deployment to start 05:20:28 | DEBUG | IntegrationsTest | Kubernetes | Status of netpol-notification-test-deployment's pods: 05:20:28 | DEBUG | IntegrationsTest | Kubernetes | - netpol-notification-test-deployment-86c44587f-j45m5 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:20:26Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:20:28 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for netpol-notification-test-deployment 05:20:28 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment netpol-notification-test-deployment 05:20:28 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment netpol-notification-test-deployment with 1 pods 05:20:28 | INFO | IntegrationsTest | Services | SR found deployment netpol-notification-test-deployment within 0s IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=true, sendCreds=true) STANDARD_OUT 05:20:28 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=true, sendCreds=true) 05:20:28 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:20:28 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace maildev-ba3f781e-d8ff-4dae-a926-a9ab0d400864 05:20:28 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-ba3f781e-d8ff-4dae-a926-a9ab0d400864 to start 05:20:28 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-ba3f781e-d8ff-4dae-a926-a9ab0d400864's pods: 05:20:28 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for maildev-ba3f781e-d8ff-4dae-a926-a9ab0d400864 05:20:31 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-ba3f781e-d8ff-4dae-a926-a9ab0d400864 to start 05:20:31 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-ba3f781e-d8ff-4dae-a926-a9ab0d400864's pods: 05:20:31 | DEBUG | IntegrationsTest | Kubernetes | - maildev-ba3f781e-d8ff-4dae-a926-a9ab0d400864-654dc55869-hpd5b Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:20:29Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:20:31 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for maildev-ba3f781e-d8ff-4dae-a926-a9ab0d400864 05:20:31 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment maildev-ba3f781e-d8ff-4dae-a926-a9ab0d400864 05:20:31 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment maildev-ba3f781e-d8ff-4dae-a926-a9ab0d400864 with 1 pods 05:20:31 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-ba3f781e-d8ff-4dae-a926-a9ab0d400864: Service created 05:20:31 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-ba3f781e-d8ff-4dae-a926-a9ab0d400864: Service created 05:21:01 | INFO | IntegrationsTest | IntegrationsTest | Found email with body: This is a test email created to test integration with StackRox. 05:21:01 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-ba3f781e-d8ff-4dae-a926-a9ab0d400864: Service deleting... 05:21:01 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-ba3f781e-d8ff-4dae-a926-a9ab0d400864: Service deleted 05:21:01 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-ba3f781e-d8ff-4dae-a926-a9ab0d400864: Service deleting... 05:21:01 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-ba3f781e-d8ff-4dae-a926-a9ab0d400864: Service deleted 05:21:01 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-smtp-ba3f781e-d8ff-4dae-a926-a9ab0d400864 to be deleted 05:21:01 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-ba3f781e-d8ff-4dae-a926-a9ab0d400864: service removed. 05:21:01 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-web-ba3f781e-d8ff-4dae-a926-a9ab0d400864 to be deleted 05:21:01 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-ba3f781e-d8ff-4dae-a926-a9ab0d400864: service removed. 05:21:02 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: maildev-ba3f781e-d8ff-4dae-a926-a9ab0d400864 05:21:02 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=true, sendCreds=true) PASSED IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=true, sendCreds=false) STANDARD_OUT 05:21:02 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=true, sendCreds=false) 05:21:02 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:21:02 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace maildev-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939 05:21:02 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939 to start 05:21:02 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939's pods: 05:21:02 | DEBUG | IntegrationsTest | Kubernetes | - maildev-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939-866589bb4f-b9zz8 Container status: [] 05:21:02 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for maildev-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939 05:21:05 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939 to start 05:21:05 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939's pods: 05:21:05 | DEBUG | IntegrationsTest | Kubernetes | - maildev-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939-866589bb4f-b9zz8 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:21:02Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:21:05 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for maildev-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939 05:21:05 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment maildev-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939 05:21:05 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment maildev-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939 with 1 pods 05:21:05 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939: Service created 05:21:05 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939: Service created 05:21:35 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments 05:21:36 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments 05:21:37 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments 05:21:38 | ERROR | IntegrationsTest | NotifierService | error testing notifier io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments at io.stackrox.proto.api.v1.NotifierServiceGrpc$NotifierServiceBlockingStub.testNotifier(NotifierServiceGrpc.java:573) [3 skipped] at services.NotifierService$_testNotifier_closure2.doCall(NotifierService.groovy:42) at services.NotifierService$_testNotifier_closure2.call(NotifierService.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at util.Helpers.withRetry(Helpers.groovy:42) at services.NotifierService.testNotifier(NotifierService.groovy:41) at objects.Notifier.testNotifier(Notifiers.groovy:30) [1 skipped] at IntegrationsTest.$spock_feature_1_0(IntegrationsTest.groovy:86) [13 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939: Service deleting... 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939: Service deleted 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939: Service deleting... 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939: Service deleted 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-smtp-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939 to be deleted 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939: service removed. 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-web-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939 to be deleted 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939: service removed. 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: maildev-765f4a8f-8c7e-4743-9ba2-6dc0eea6a939 05:21:38 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=true, sendCreds=false) PASSED IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=false, sendCreds=false) STANDARD_OUT 05:21:38 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=false, sendCreds=false) 05:21:38 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace maildev-071ef4f7-7eeb-4fe3-bc16-220790180037 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-071ef4f7-7eeb-4fe3-bc16-220790180037 to start 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-071ef4f7-7eeb-4fe3-bc16-220790180037's pods: 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | - maildev-071ef4f7-7eeb-4fe3-bc16-220790180037-786757dc76-wnq72 Container status: [] 05:21:38 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for maildev-071ef4f7-7eeb-4fe3-bc16-220790180037 05:21:41 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-071ef4f7-7eeb-4fe3-bc16-220790180037 to start 05:21:41 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-071ef4f7-7eeb-4fe3-bc16-220790180037's pods: 05:21:42 | DEBUG | IntegrationsTest | Kubernetes | - maildev-071ef4f7-7eeb-4fe3-bc16-220790180037-786757dc76-wnq72 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:21:39Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:21:42 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for maildev-071ef4f7-7eeb-4fe3-bc16-220790180037 05:21:42 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment maildev-071ef4f7-7eeb-4fe3-bc16-220790180037 05:21:42 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment maildev-071ef4f7-7eeb-4fe3-bc16-220790180037 with 1 pods 05:21:42 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-071ef4f7-7eeb-4fe3-bc16-220790180037: Service created 05:21:42 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-071ef4f7-7eeb-4fe3-bc16-220790180037: Service created 05:22:12 | INFO | IntegrationsTest | IntegrationsTest | Found email with body: This is a test email created to test integration with StackRox. 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-071ef4f7-7eeb-4fe3-bc16-220790180037: Service deleting... 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-071ef4f7-7eeb-4fe3-bc16-220790180037: Service deleted 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-071ef4f7-7eeb-4fe3-bc16-220790180037: Service deleting... 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-071ef4f7-7eeb-4fe3-bc16-220790180037: Service deleted 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-smtp-071ef4f7-7eeb-4fe3-bc16-220790180037 to be deleted 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-071ef4f7-7eeb-4fe3-bc16-220790180037: service removed. 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-web-071ef4f7-7eeb-4fe3-bc16-220790180037 to be deleted 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-071ef4f7-7eeb-4fe3-bc16-220790180037: service removed. 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: maildev-071ef4f7-7eeb-4fe3-bc16-220790180037 05:22:12 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=false, sendCreds=false) PASSED IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=false, sendCreds=true) STANDARD_OUT 05:22:12 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=false, sendCreds=true) 05:22:12 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace maildev-485efc79-82f1-4022-b107-0f4e1c6f8226 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-485efc79-82f1-4022-b107-0f4e1c6f8226 to start 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-485efc79-82f1-4022-b107-0f4e1c6f8226's pods: 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | - maildev-485efc79-82f1-4022-b107-0f4e1c6f8226-6c489f956b-gg9lb Container status: [] 05:22:12 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for maildev-485efc79-82f1-4022-b107-0f4e1c6f8226 05:22:15 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-485efc79-82f1-4022-b107-0f4e1c6f8226 to start 05:22:15 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-485efc79-82f1-4022-b107-0f4e1c6f8226's pods: 05:22:15 | DEBUG | IntegrationsTest | Kubernetes | - maildev-485efc79-82f1-4022-b107-0f4e1c6f8226-6c489f956b-gg9lb Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:22:13Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:22:15 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for maildev-485efc79-82f1-4022-b107-0f4e1c6f8226 05:22:15 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment maildev-485efc79-82f1-4022-b107-0f4e1c6f8226 05:22:15 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment maildev-485efc79-82f1-4022-b107-0f4e1c6f8226 with 1 pods 05:22:15 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-485efc79-82f1-4022-b107-0f4e1c6f8226: Service created 05:22:15 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-485efc79-82f1-4022-b107-0f4e1c6f8226: Service created 05:22:45 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments 05:22:46 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments 05:22:48 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments 05:22:49 | ERROR | IntegrationsTest | NotifierService | error testing notifier io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments at io.stackrox.proto.api.v1.NotifierServiceGrpc$NotifierServiceBlockingStub.testNotifier(NotifierServiceGrpc.java:573) [3 skipped] at services.NotifierService$_testNotifier_closure2.doCall(NotifierService.groovy:42) at services.NotifierService$_testNotifier_closure2.call(NotifierService.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at util.Helpers.withRetry(Helpers.groovy:42) at services.NotifierService.testNotifier(NotifierService.groovy:41) at objects.Notifier.testNotifier(Notifiers.groovy:30) [1 skipped] at IntegrationsTest.$spock_feature_1_0(IntegrationsTest.groovy:86) [13 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:22:49 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-485efc79-82f1-4022-b107-0f4e1c6f8226: Service deleting... 05:22:49 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-485efc79-82f1-4022-b107-0f4e1c6f8226: Service deleted 05:22:49 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-485efc79-82f1-4022-b107-0f4e1c6f8226: Service deleting... 05:22:49 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-485efc79-82f1-4022-b107-0f4e1c6f8226: Service deleted 05:22:49 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-smtp-485efc79-82f1-4022-b107-0f4e1c6f8226 to be deleted 05:22:49 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-485efc79-82f1-4022-b107-0f4e1c6f8226: service removed. 05:22:49 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-web-485efc79-82f1-4022-b107-0f4e1c6f8226 to be deleted 05:22:49 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-485efc79-82f1-4022-b107-0f4e1c6f8226: service removed. 05:22:49 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: maildev-485efc79-82f1-4022-b107-0f4e1c6f8226 05:22:49 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=false, sendCreds=true) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (no TLS, audit=false) STANDARD_OUT 05:22:49 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (no TLS, audit=false) 05:22:49 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (no TLS, audit=false) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, no verify, audit=false) STANDARD_OUT 05:22:49 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (TLS, no verify, audit=false) 05:22:49 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, no verify, audit=false) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify custom CA, audit=false) STANDARD_OUT 05:22:49 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (TLS, verify custom CA, audit=false) 05:22:49 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify custom CA, audit=false) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify system CA, audit=false) STANDARD_OUT 05:22:49 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (TLS, verify system CA, audit=false) 05:22:49 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments 05:22:50 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments 05:22:51 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments 05:22:52 | ERROR | IntegrationsTest | NotifierService | error testing notifier io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments at io.stackrox.proto.api.v1.NotifierServiceGrpc$NotifierServiceBlockingStub.testNotifier(NotifierServiceGrpc.java:573) [3 skipped] at services.NotifierService$_testNotifier_closure2.doCall(NotifierService.groovy:42) at services.NotifierService$_testNotifier_closure2.call(NotifierService.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at util.Helpers.withRetry(Helpers.groovy:42) at services.NotifierService.testNotifier(NotifierService.groovy:41) at objects.Notifier.testNotifier(Notifiers.groovy:30) [1 skipped] at IntegrationsTest.$spock_feature_1_1(IntegrationsTest.groovy:165) [13 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:22:52 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify system CA, audit=false) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (no TLS, audit=true) STANDARD_OUT 05:22:52 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (no TLS, audit=true) 05:22:52 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (no TLS, audit=true) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, no verify, audit=true) STANDARD_OUT 05:22:52 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (TLS, no verify, audit=true) 05:22:52 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, no verify, audit=true) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify custom CA, audit=true) STANDARD_OUT 05:22:52 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (TLS, verify custom CA, audit=true) 05:22:52 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify custom CA, audit=true) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify system CA, audit=true) STANDARD_OUT 05:22:52 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (TLS, verify system CA, audit=true) 05:22:52 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments 05:22:53 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments 05:22:54 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments 05:22:55 | ERROR | IntegrationsTest | NotifierService | error testing notifier io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments at io.stackrox.proto.api.v1.NotifierServiceGrpc$NotifierServiceBlockingStub.testNotifier(NotifierServiceGrpc.java:573) [3 skipped] at services.NotifierService$_testNotifier_closure2.doCall(NotifierService.groovy:42) at services.NotifierService$_testNotifier_closure2.call(NotifierService.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at util.Helpers.withRetry(Helpers.groovy:42) at services.NotifierService.testNotifier(NotifierService.groovy:41) at objects.Notifier.testNotifier(Notifiers.groovy:30) [1 skipped] at IntegrationsTest.$spock_feature_1_1(IntegrationsTest.groovy:165) [13 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:22:55 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify system CA, audit=true) PASSED IntegrationsTest > Verify Splunk Integration STANDARD_OUT 05:22:55 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Splunk Integration 05:22:55 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:22:55 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace splunk-cfed37ed-74d9-4bd2-865a-1deb79c96f56 05:22:55 | DEBUG | IntegrationsTest | Kubernetes | Waiting for splunk-cfed37ed-74d9-4bd2-865a-1deb79c96f56 to start 05:22:55 | DEBUG | IntegrationsTest | Kubernetes | Status of splunk-cfed37ed-74d9-4bd2-865a-1deb79c96f56's pods: 05:22:55 | DEBUG | IntegrationsTest | Kubernetes | - splunk-cfed37ed-74d9-4bd2-865a-1deb79c96f56-57695f86f-jtgxn Container status: [] 05:22:55 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for splunk-cfed37ed-74d9-4bd2-865a-1deb79c96f56 05:22:58 | DEBUG | IntegrationsTest | Kubernetes | Waiting for splunk-cfed37ed-74d9-4bd2-865a-1deb79c96f56 to start 05:22:58 | DEBUG | IntegrationsTest | Kubernetes | Status of splunk-cfed37ed-74d9-4bd2-865a-1deb79c96f56's pods: 05:22:59 | DEBUG | IntegrationsTest | Kubernetes | - splunk-cfed37ed-74d9-4bd2-865a-1deb79c96f56-57695f86f-jtgxn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:22:56Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:22:59 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for splunk-cfed37ed-74d9-4bd2-865a-1deb79c96f56 05:22:59 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment splunk-cfed37ed-74d9-4bd2-865a-1deb79c96f56 05:22:59 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment splunk-cfed37ed-74d9-4bd2-865a-1deb79c96f56 with 1 pods 05:22:59 | DEBUG | IntegrationsTest | Kubernetes | splunk-collector-cfed37ed-74d9-4bd2-865a-1deb79c96f56: Service created 05:22:59 | DEBUG | IntegrationsTest | Kubernetes | splunk-syslog-cfed37ed-74d9-4bd2-865a-1deb79c96f56: Service created 05:22:59 | INFO | IntegrationsTest | SplunkUtil | Waiting for Splunk to boot... 05:22:59 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 10s (attempt 0 of 30): javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake 05:23:09 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 10s (attempt 1 of 30): javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake 05:23:19 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 10s (attempt 2 of 30): javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake 05:23:30 | DEBUG | IntegrationsTest | SplunkUtil | Splunkd status: {"links":{},"origin":"https://127.0.0.1:38025/services/server/health","updated":"2025-10-31T05:23:30+00:00","generator":{"build":"e9494146ae5c","version":"9.0.5"},"entry":[{"name":"splunkd","id":"https://127.0.0.1:38025/services/server/health/splunkd","updated":"1970-01-01T00:00:00+00:00","links":{"alternate":"/services/server/health/splunkd","list":"/services/server/health/splunkd"},"author":"system","acl":{"app":"","can_list":true,"can_write":true,"modifiable":false,"owner":"system","perms":{"read":["admin","splunk-system-role"],"write":[]},"removable":false,"sharing":"system"},"content":{"eai:acl":null,"features":{"File Monitor Input":{"features":{"Forwarder Ingestion Latency":{"health":"green"},"Ingestion Latency":{"health":"green"},"Large and Archive File Reader-0":{"health":"green"},"Real-time Reader-0":{"health":"green"}},"health":"green"},"Index Processor":{"features":{"Buckets":{"health":"green"},"Disk Space":{"health":"green"},"Index Optimization":{"health":"green"}},"health":"green"},"Search Scheduler":{"features":{"Scheduler Suppression":{"health":"green"},"Search Lag":{"health":"green"},"Searches Delayed":{"health":"green"},"Searches Skipped in the last 24 hours":{"health":"green"}},"health":"green"},"Workload Management":{"disabled":true,"health":"green"}},"health":"green"}}],"paging":{"total":1,"perPage":30,"offset":0},"messages":[]} 05:23:30 | INFO | IntegrationsTest | SplunkUtil | Splunk has completed booting 05:23:30 | INFO | IntegrationsTest | SplunkUtil | Attempting to create new HEC ingest token 05:23:31 | INFO | IntegrationsTest | SplunkNotifier | Using HEC ingest token: 55822b7d-9322-492b-95eb-7fa7d67949f7 05:23:31 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:23:31 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:23:31 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace nginx-spl-violation 05:23:31 | DEBUG | IntegrationsTest | Kubernetes | Waiting for nginx-spl-violation to start 05:23:31 | DEBUG | IntegrationsTest | Kubernetes | Status of nginx-spl-violation's pods: 05:23:31 | DEBUG | IntegrationsTest | Kubernetes | - nginx-spl-violation-6767dbb4bd-rvplp Container status: [] 05:23:31 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for nginx-spl-violation 05:23:34 | DEBUG | IntegrationsTest | Kubernetes | Waiting for nginx-spl-violation to start 05:23:34 | DEBUG | IntegrationsTest | Kubernetes | Status of nginx-spl-violation's pods: 05:23:34 | DEBUG | IntegrationsTest | Kubernetes | - nginx-spl-violation-6767dbb4bd-rvplp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:23:32Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:23:34 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for nginx-spl-violation 05:23:34 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment nginx-spl-violation 05:23:34 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment nginx-spl-violation with 1 pods 05:23:34 | DEBUG | IntegrationsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:23:34 | INFO | IntegrationsTest | Services | violation size is: 1 05:23:34 | INFO | IntegrationsTest | Services | Latest tag cfed37ed-74d9-4bd2-865a-1deb79c96f56 triggered after waiting 0 seconds 05:23:34 | INFO | IntegrationsTest | SplunkUtil | Waiting for data to arrive in Splunk for search query: search sourcetype=stackrox-alert Latest tag cfed37ed-74d9-4bd2-865a-1deb79c96f56 05:23:34 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1761888214.1"} 05:23:34 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1761888214.1 05:23:34 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 0 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:23:49 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1761888229.3"} 05:23:49 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1761888229.3 05:23:50 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 1 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:24:05 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1761888245.5"} 05:24:05 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1761888245.5 05:24:05 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 2 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:24:20 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1761888260.6"} 05:24:20 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1761888260.6 05:24:20 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 3 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:24:36 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1761888275.7"} 05:24:36 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1761888275.7 05:24:36 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 4 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:24:51 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1761888291.8"} 05:24:51 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1761888291.8 05:24:51 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 5 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:25:06 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1761888306.9"} 05:25:06 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1761888306.9 05:25:06 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 6 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:25:22 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1761888322.10"} 05:25:22 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1761888322.10 05:25:22 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 7 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:25:37 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1761888337.11"} 05:25:37 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1761888337.11 05:25:37 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 8 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:25:52 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1761888352.12"} 05:25:52 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1761888352.12 05:25:52 | INFO | IntegrationsTest | SplunkUtil | Data arrived in Splunk! 05:25:52 | INFO | IntegrationsTest | SplunkNotifier | Verifying data in Splunk 05:25:52 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: nginx-spl-violation 05:25:53 | DEBUG | IntegrationsTest | Kubernetes | splunk-syslog-cfed37ed-74d9-4bd2-865a-1deb79c96f56: Service deleting... 05:25:53 | DEBUG | IntegrationsTest | Kubernetes | splunk-syslog-cfed37ed-74d9-4bd2-865a-1deb79c96f56: Service deleted 05:25:53 | DEBUG | IntegrationsTest | Kubernetes | splunk-collector-cfed37ed-74d9-4bd2-865a-1deb79c96f56: Service deleting... 05:25:53 | DEBUG | IntegrationsTest | Kubernetes | splunk-collector-cfed37ed-74d9-4bd2-865a-1deb79c96f56: Service deleted 05:25:53 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: splunk-cfed37ed-74d9-4bd2-865a-1deb79c96f56 05:25:53 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Splunk Integration PASSED IntegrationsTest > Verify Network Simulator Notifications: #type > Verify Network Simulator Notifications: SLACK STANDARD_OUT 05:25:53 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Network Simulator Notifications: SLACK 05:25:53 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:25:53 | DEBUG | IntegrationsTest | Notifier | Nothing to validate 05:25:53 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Network Simulator Notifications: #type > Verify Network Simulator Notifications: SLACK PASSED IntegrationsTest > Verify Network Simulator Notifications: #type > Verify Network Simulator Notifications: GENERIC STANDARD_OUT 05:25:53 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Network Simulator Notifications: GENERIC 05:25:53 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:25:53 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Network Simulator Notifications: #type > Verify Network Simulator Notifications: GENERIC PASSED IntegrationsTest > Verify Network Simulator Notifications: #type > Verify Network Simulator Notifications: SLACK, GENERIC STANDARD_OUT 05:25:53 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Network Simulator Notifications: SLACK, GENERIC 05:25:53 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:25:53 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:25:53 | DEBUG | IntegrationsTest | Notifier | Nothing to validate 05:25:53 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Network Simulator Notifications: #type > Verify Network Simulator Notifications: SLACK, GENERIC PASSED IntegrationsTest > Verify Policy Violation Notifications: #type > Verify Policy Violation Notifications: GENERIC STANDARD_OUT 05:25:53 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Policy Violation Notifications: GENERIC 05:25:53 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:25:54 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:25:54 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace policy-violation-generic-notification 05:25:54 | DEBUG | IntegrationsTest | Kubernetes | Waiting for policy-violation-generic-notification to start 05:25:54 | DEBUG | IntegrationsTest | Kubernetes | Status of policy-violation-generic-notification's pods: 05:25:54 | DEBUG | IntegrationsTest | Kubernetes | - policy-violation-generic-notification-5cfb968598-nq95l Container status: [] 05:25:54 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for policy-violation-generic-notification 05:25:57 | DEBUG | IntegrationsTest | Kubernetes | Waiting for policy-violation-generic-notification to start 05:25:57 | DEBUG | IntegrationsTest | Kubernetes | Status of policy-violation-generic-notification's pods: 05:25:57 | DEBUG | IntegrationsTest | Kubernetes | - policy-violation-generic-notification-5cfb968598-nq95l Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:25:54Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:25:57 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for policy-violation-generic-notification 05:25:57 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment policy-violation-generic-notification 05:25:57 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment policy-violation-generic-notification with 1 pods 05:25:57 | INFO | IntegrationsTest | Services | SR found deployment policy-violation-generic-notification within 0s 05:25:57 | DEBUG | IntegrationsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:25:57 | INFO | IntegrationsTest | Services | violation size is: 1 05:25:57 | INFO | IntegrationsTest | Services | Policy Notifier Test Policy triggered after waiting 0 seconds 05:25:57 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: policy-violation-generic-notification 05:25:57 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Policy Violation Notifications: #type > Verify Policy Violation Notifications: GENERIC PASSED IntegrationsTest > Verify Attempted Policy Violation Notifications: #type > Verify Attempted Policy Violation Notifications: GENERIC STANDARD_OUT 05:25:57 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Attempted Policy Violation Notifications: GENERIC 05:25:57 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:26:02 | WARN | IntegrationsTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Policy Notifier Test Policy - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'policy-violation-generic-notification' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Policy Notifier Test Policy - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'policy-violation-generic-notification' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Policy Notifier Test Policy - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'policy-violation-generic-notification' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Policy Notifier Test Policy - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'policy-violation-generic-notification' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at jdk.internal.reflect.GeneratedMethodAccessor1547.invoke(Unknown Source) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [8 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at IntegrationsTest.$spock_feature_1_5(IntegrationsTest.groovy:430) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:26:02 | DEBUG | IntegrationsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:26:02 | INFO | IntegrationsTest | Services | violation size is: 1 05:26:02 | INFO | IntegrationsTest | Services | Policy Notifier Test Policy triggered after waiting 0 seconds 05:26:02 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Attempted Policy Violation Notifications: #type > Verify Attempted Policy Violation Notifications: GENERIC PASSED IntegrationsTest > Verify external backup errors on external DB SKIPPED IntegrationsTest > Verify AWS S3 Integration: #integrationName > Verify AWS S3 Integration: S3 with endpoint STANDARD_OUT 05:26:02 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify AWS S3 Integration: S3 with endpoint 05:26:03 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify AWS S3 Integration: #integrationName > Verify AWS S3 Integration: S3 with endpoint PASSED IntegrationsTest > Verify AWS S3 Integration: #integrationName > Verify AWS S3 Integration: S3 without endpoint STANDARD_OUT 05:26:03 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify AWS S3 Integration: S3 without endpoint 05:26:03 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify AWS S3 Integration: #integrationName > Verify AWS S3 Integration: S3 without endpoint PASSED IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/path-based/no-prefix STANDARD_OUT 05:26:03 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify S3 Compatible Integration: Cloudflare R2/path-based/no-prefix 05:26:03 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/path-based/no-prefix PASSED IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/path-based/https STANDARD_OUT 05:26:03 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify S3 Compatible Integration: Cloudflare R2/path-based/https 05:26:04 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/path-based/https PASSED IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/virtual-hosted/no-prefix STANDARD_OUT 05:26:04 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify S3 Compatible Integration: Cloudflare R2/virtual-hosted/no-prefix 05:26:04 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/virtual-hosted/no-prefix PASSED IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/virtual-hosted/https STANDARD_OUT 05:26:04 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify S3 Compatible Integration: Cloudflare R2/virtual-hosted/https 05:26:04 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/virtual-hosted/https PASSED IntegrationsTest > Verify GCS Integration: #integrationName > Verify GCS Integration: GCS with service account key STANDARD_OUT 05:26:04 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify GCS Integration: GCS with service account key 05:26:04 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify GCS Integration: #integrationName > Verify GCS Integration: GCS with service account key PASSED IntegrationsTest > Verify GCS Integration: #integrationName > Verify GCS Integration: GCS with workload identity STANDARD_OUT 05:26:04 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify GCS Integration: GCS with workload identity 05:26:04 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:26:04 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify GCS Integration: #integrationName > Verify GCS Integration: GCS with workload identity SKIPPED IntegrationsTest > Verify Policy Violation Notifications Destination Overrides: #type > Verify Policy Violation Notifications Destination Overrides: Slack deploy override STANDARD_OUT 05:26:04 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Policy Violation Notifications Destination Overrides: Slack deploy override 05:26:04 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:26:05 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:26:05 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace policy-violation-generic-notification-deploy-override 05:26:05 | DEBUG | IntegrationsTest | Kubernetes | Waiting for policy-violation-generic-notification-deploy-override to start 05:26:05 | DEBUG | IntegrationsTest | Kubernetes | Status of policy-violation-generic-notification-deploy-override's pods: 05:26:05 | DEBUG | IntegrationsTest | Kubernetes | - policy-violation-generic-notification-deploy-override-75d6sfh9g Container status: [] 05:26:05 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for policy-violation-generic-notification-deploy-override 05:26:08 | DEBUG | IntegrationsTest | Kubernetes | Waiting for policy-violation-generic-notification-deploy-override to start 05:26:08 | DEBUG | IntegrationsTest | Kubernetes | Status of policy-violation-generic-notification-deploy-override's pods: 05:26:08 | DEBUG | IntegrationsTest | Kubernetes | - policy-violation-generic-notification-deploy-override-75d6sfh9g Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:26:05Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:26:08 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for policy-violation-generic-notification-deploy-override 05:26:08 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment policy-violation-generic-notification-deploy-override 05:26:08 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment policy-violation-generic-notification-deploy-override with 1 pods 05:26:08 | INFO | IntegrationsTest | Services | SR found deployment policy-violation-generic-notification-deploy-override within 0s 05:26:08 | DEBUG | IntegrationsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:26:08 | INFO | IntegrationsTest | Services | violation size is: 1 05:26:08 | INFO | IntegrationsTest | Services | Policy Notifier Test Policy triggered after waiting 0 seconds 05:26:08 | DEBUG | IntegrationsTest | Notifier | Nothing to validate 05:26:08 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: policy-violation-generic-notification-deploy-override 05:26:08 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Policy Violation Notifications Destination Overrides: #type > Verify Policy Violation Notifications Destination Overrides: Slack deploy override PASSED IntegrationsTest > Verify Policy Violation Notifications Destination Overrides: #type > Verify Policy Violation Notifications Destination Overrides: Slack namespace override STANDARD_OUT 05:26:08 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Policy Violation Notifications Destination Overrides: Slack namespace override 05:26:08 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:26:08 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:26:08 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace policy-violation-generic-notification-ns-override 05:26:08 | DEBUG | IntegrationsTest | Kubernetes | Waiting for policy-violation-generic-notification-ns-override to start 05:26:08 | DEBUG | IntegrationsTest | Kubernetes | Status of policy-violation-generic-notification-ns-override's pods: 05:26:08 | DEBUG | IntegrationsTest | Kubernetes | - policy-violation-generic-notification-ns-override-7d568f4f787rz Container status: [] 05:26:08 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for policy-violation-generic-notification-ns-override 05:26:11 | DEBUG | IntegrationsTest | Kubernetes | Waiting for policy-violation-generic-notification-ns-override to start 05:26:11 | DEBUG | IntegrationsTest | Kubernetes | Status of policy-violation-generic-notification-ns-override's pods: 05:26:11 | DEBUG | IntegrationsTest | Kubernetes | - policy-violation-generic-notification-ns-override-7d568f4f787rz Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:26:09Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:26:11 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for policy-violation-generic-notification-ns-override 05:26:11 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment policy-violation-generic-notification-ns-override 05:26:11 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment policy-violation-generic-notification-ns-override with 1 pods 05:26:11 | INFO | IntegrationsTest | Services | SR found deployment policy-violation-generic-notification-ns-override within 0s 05:26:11 | DEBUG | IntegrationsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:26:11 | INFO | IntegrationsTest | Services | violation size is: 1 05:26:11 | INFO | IntegrationsTest | Services | Policy Notifier Test Policy triggered after waiting 0 seconds 05:26:11 | DEBUG | IntegrationsTest | Notifier | Nothing to validate 05:26:11 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: policy-violation-generic-notification-ns-override 05:26:11 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Policy Violation Notifications Destination Overrides: #type > Verify Policy Violation Notifications Destination Overrides: Slack namespace override PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Stackrox Scanner integration - default config STANDARD_OUT 05:26:11 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Stackrox Scanner integration - default config 05:26:12 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:12 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: d2333b5d-3e05-45d8-b2be-29fefd20956e 05:26:12 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: d2333b5d-3e05-45d8-b2be-29fefd20956e 05:26:12 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Stackrox Scanner integration - default config PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Clair Scanner integration - default config STANDARD_OUT 05:26:12 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Clair Scanner integration - default config 05:26:12 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:12 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: e07012db-7658-4bcb-b6c2-c4768ba27039 05:26:12 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: e07012db-7658-4bcb-b6c2-c4768ba27039 05:26:12 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:26:12 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Clair Scanner integration - default config SKIPPED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Quay Registry+Scanner integration - default config STANDARD_OUT 05:26:12 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Quay Registry+Scanner integration - default config 05:26:13 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:13 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: a72fe04c-a08b-40d4-8a81-ecc6fb7c02c9 05:26:13 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: a72fe04c-a08b-40d4-8a81-ecc6fb7c02c9 05:26:13 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Quay Registry+Scanner integration - default config PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify GitHub Container Registry integration - default config STANDARD_OUT 05:26:13 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify GitHub Container Registry integration - default config 05:26:13 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:13 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 15c03bac-c9fb-4315-8c2a-02589476261f 05:26:13 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 15c03bac-c9fb-4315-8c2a-02589476261f 05:26:13 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify GitHub Container Registry integration - default config PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Google Artifact Registry integration - default config STANDARD_OUT 05:26:13 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Google Artifact Registry integration - default config 05:26:13 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:13 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 02fd585a-d237-40c4-b11d-3f7a602b014b 05:26:13 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 02fd585a-d237-40c4-b11d-3f7a602b014b 05:26:13 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Google Artifact Registry integration - default config PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Google Artifact Registry integration - requires workload identity STANDARD_OUT 05:26:13 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Google Artifact Registry integration - requires workload identity 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 747acf7d-099b-44e2-aafd-2dc27cdb0f5c 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 747acf7d-099b-44e2-aafd-2dc27cdb0f5c 05:26:14 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: requires GCP workload identity 05:26:14 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Google Artifact Registry integration - requires workload identity SKIPPED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify GCR Registry+Scanner integration - default config STANDARD_OUT 05:26:14 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify GCR Registry+Scanner integration - default config 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 77f47bce-60f2-455b-97e5-e523d993cf23 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 77f47bce-60f2-455b-97e5-e523d993cf23 05:26:14 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify GCR Registry+Scanner integration - default config PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify GCR Registry+Scanner integration - requires workload identity STANDARD_OUT 05:26:14 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify GCR Registry+Scanner integration - requires workload identity 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 09e2f93d-677b-4b97-a43f-c5cc4275c989 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 09e2f93d-677b-4b97-a43f-c5cc4275c989 05:26:14 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: requires GCP workload identity 05:26:14 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify GCR Registry+Scanner integration - requires workload identity SKIPPED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Azure Registry integration - default config with AzureConfig STANDARD_OUT 05:26:14 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Azure Registry integration - default config with AzureConfig 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: b3d844d1-3a85-408f-861a-ab00cf1c520b 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: b3d844d1-3a85-408f-861a-ab00cf1c520b 05:26:14 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Azure Registry integration - default config with AzureConfig PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Azure Registry integration - default config with DockerConfig STANDARD_OUT 05:26:14 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Azure Registry integration - default config with DockerConfig 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 0fb4929a-27ca-42ef-8602-a03628439d3c 05:26:14 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 0fb4929a-27ca-42ef-8602-a03628439d3c 05:26:14 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Azure Registry integration - default config with DockerConfig PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Azure Registry integration - requires AKS managed identity STANDARD_OUT 05:26:14 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Azure Registry integration - requires AKS managed identity 05:26:15 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:15 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: af6e7b2d-39b7-4996-8a76-40275ab6973c 05:26:15 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: af6e7b2d-39b7-4996-8a76-40275ab6973c 05:26:15 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: requires Azure workload identity 05:26:15 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Azure Registry integration - requires AKS managed identity SKIPPED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify ECR Registry integration - default config STANDARD_OUT 05:26:15 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify ECR Registry integration - default config 05:26:15 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:15 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: e71b68ad-de05-44d4-a8f5-6f77b5aff25c 05:26:15 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: e71b68ad-de05-44d4-a8f5-6f77b5aff25c 05:26:15 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify ECR Registry integration - default config PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify ECR Registry integration - without endpoint STANDARD_OUT 05:26:15 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify ECR Registry integration - without endpoint 05:26:15 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:15 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 1396fb4e-af06-4e8b-b776-0f9f9cfc19ca 05:26:15 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 1396fb4e-af06-4e8b-b776-0f9f9cfc19ca 05:26:15 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify ECR Registry integration - without endpoint PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify ECR Registry integration - requires IAM STANDARD_OUT 05:26:15 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify ECR Registry integration - requires IAM 05:26:15 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:26:15 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: f868979f-4c0b-42dd-839b-c0faa4672d04 05:26:16 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: f868979f-4c0b-42dd-839b-c0faa4672d04 05:26:16 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: requires AWS container IAM role 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify ECR Registry integration - requires IAM SKIPPED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Stackrox Scanner integration - invalid endpoint STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Stackrox Scanner integration - invalid endpoint 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Stackrox Scanner integration - invalid endpoint PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Clair Scanner integration - invalid endpoint STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Clair Scanner integration - invalid endpoint 05:26:16 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Clair Scanner integration - invalid endpoint SKIPPED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Azure Registry integration - incorrect user STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Azure Registry integration - incorrect user 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Azure Registry integration - incorrect user PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Azure Registry integration - incorrect password STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Azure Registry integration - incorrect password 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Azure Registry integration - incorrect password PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Azure Registry integration - invalid endpoint STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Azure Registry integration - invalid endpoint 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Azure Registry integration - invalid endpoint PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - invalid endpoint STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - invalid endpoint 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - invalid endpoint PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect registry ID STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - incorrect registry ID 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect registry ID PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect region STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - incorrect region 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect region PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect key STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - incorrect key 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect key PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect secret STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - incorrect secret 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect secret PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - AssumeRole with endpoint set STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - AssumeRole with endpoint set 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - AssumeRole with endpoint set PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - AssumeRole with incorrect role STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - AssumeRole with incorrect role 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - AssumeRole with incorrect role PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - AssumeRole external ID with incorrect external ID STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - AssumeRole external ID with incorrect external ID 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - AssumeRole external ID with incorrect external ID PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Quay Registry+Scanner integration - invalid endpoint STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Quay Registry+Scanner integration - invalid endpoint 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Quay Registry+Scanner integration - invalid endpoint PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Quay Registry+Scanner integration - invalid endpoint STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Quay Registry+Scanner integration - invalid endpoint 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Quay Registry+Scanner integration - invalid endpoint PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Quay Registry+Scanner integration - incorrect token STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Quay Registry+Scanner integration - incorrect token 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Quay Registry+Scanner integration - incorrect token PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper GCR Registry+Scanner integration - invalid endpoint STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper GCR Registry+Scanner integration - invalid endpoint 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper GCR Registry+Scanner integration - invalid endpoint PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper GCR Registry+Scanner integration - account without access STANDARD_OUT 05:26:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper GCR Registry+Scanner integration - account without access 05:26:17 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper GCR Registry+Scanner integration - account without access PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper GCR Registry+Scanner integration - incorrect project STANDARD_OUT 05:26:17 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper GCR Registry+Scanner integration - incorrect project 05:26:17 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper GCR Registry+Scanner integration - incorrect project PASSED IntegrationsTest > Verify syslog notifier STANDARD_OUT 05:26:17 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify syslog notifier 05:26:17 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:26:17 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace syslog-66b55d5f-e9ba-46fb-a889-d1db74c2ec1f 05:26:17 | DEBUG | IntegrationsTest | Kubernetes | Waiting for syslog-66b55d5f-e9ba-46fb-a889-d1db74c2ec1f to start 05:26:17 | DEBUG | IntegrationsTest | Kubernetes | Status of syslog-66b55d5f-e9ba-46fb-a889-d1db74c2ec1f's pods: 05:26:17 | DEBUG | IntegrationsTest | Kubernetes | - syslog-66b55d5f-e9ba-46fb-a889-d1db74c2ec1f-6fd7fc6f4d-kbf9v Container status: [] 05:26:17 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for syslog-66b55d5f-e9ba-46fb-a889-d1db74c2ec1f 05:26:20 | DEBUG | IntegrationsTest | Kubernetes | Waiting for syslog-66b55d5f-e9ba-46fb-a889-d1db74c2ec1f to start 05:26:20 | DEBUG | IntegrationsTest | Kubernetes | Status of syslog-66b55d5f-e9ba-46fb-a889-d1db74c2ec1f's pods: 05:26:20 | DEBUG | IntegrationsTest | Kubernetes | - syslog-66b55d5f-e9ba-46fb-a889-d1db74c2ec1f-6fd7fc6f4d-kbf9v Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:26:18Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:26:20 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for syslog-66b55d5f-e9ba-46fb-a889-d1db74c2ec1f 05:26:20 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment syslog-66b55d5f-e9ba-46fb-a889-d1db74c2ec1f 05:26:20 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment syslog-66b55d5f-e9ba-46fb-a889-d1db74c2ec1f with 1 pods 05:26:20 | DEBUG | IntegrationsTest | Kubernetes | rsyslog-service: Service created 05:26:20 | DEBUG | IntegrationsTest | Kubernetes | rest-service: Service created 05:26:35 | DEBUG | IntegrationsTest | Kubernetes | rsyslog-service: Service deleting... 05:26:35 | DEBUG | IntegrationsTest | Kubernetes | rsyslog-service: Service deleted 05:26:35 | DEBUG | IntegrationsTest | Kubernetes | rest-service: Service deleting... 05:26:35 | DEBUG | IntegrationsTest | Kubernetes | rest-service: Service deleted 05:26:35 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: syslog-66b55d5f-e9ba-46fb-a889-d1db74c2ec1f 05:26:35 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify syslog notifier PASSED IntegrationsTest STANDARD_OUT 05:26:35 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: netpol-notification-test-deployment 05:26:35 | INFO | IntegrationsTest | IntegrationsTest | Ending testsuite 05:26:35 | INFO | IntegrationsTest | IntegrationsTest | Checking if cluster is healthy after test 05:26:35 | DEBUG | IntegrationsTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries K8sEventDetectionTest STANDARD_OUT 05:26:36 | INFO | K8sEventDetectionTest | K8sEventDetectionTest | Starting testsuite 05:26:36 | INFO | K8sEventDetectionTest | K8sEventDetectionTest | Ending testsuite 05:26:36 | INFO | K8sEventDetectionTest | K8sEventDetectionTest | Checking if cluster is healthy after test 05:26:36 | DEBUG | K8sEventDetectionTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries K8sRbacTest STANDARD_OUT 05:26:36 | INFO | K8sRbacTest | K8sRbacTest | Starting testsuite K8sRbacTest > Verify scraped service accounts STANDARD_OUT 05:26:36 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Verify scraped service accounts 05:27:30 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Verify scraped service accounts PASSED K8sRbacTest > Add Service Account and verify it gets scraped STANDARD_OUT 05:27:30 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Add Service Account and verify it gets scraped 05:27:30 | DEBUG | K8sRbacTest | ServiceAccountService | Waiting for Service Account 05:27:30 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Add Service Account and verify it gets scraped PASSED K8sRbacTest > Create deployment with service account and verify relationships STANDARD_OUT 05:27:30 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Create deployment with service account and verify relationships 05:27:30 | DEBUG | K8sRbacTest | OpenShift | Namespace qa already exists 05:27:30 | DEBUG | K8sRbacTest | Kubernetes | Told the orchestrator to createOrReplace test-deployment 05:27:30 | DEBUG | K8sRbacTest | Kubernetes | Waiting for test-deployment to start 05:27:30 | DEBUG | K8sRbacTest | Kubernetes | Status of test-deployment's pods: 05:27:30 | DEBUG | K8sRbacTest | Kubernetes | - test-deployment-59dcbd9977-sqxl7 Container status: [] 05:27:35 | DEBUG | K8sRbacTest | Kubernetes | test-deployment: deployment created (skipped replica wait). 05:27:35 | DEBUG | K8sRbacTest | Kubernetes | Updating deployment test-deployment with 1 pods 05:27:35 | INFO | K8sRbacTest | Services | deploymentID for [test-deployment] is null, checking orchestrator directly for deployment ID 05:27:35 | INFO | K8sRbacTest | Services | SR found deployment test-deployment within 0s 05:27:35 | DEBUG | K8sRbacTest | RbacService | Waiting for Role 05:27:35 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding 05:27:35 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:27:35 | DEBUG | K8sRbacTest | Kubernetes | Removed the deployment: test-deployment 05:27:35 | DEBUG | K8sRbacTest | Kubernetes | test-deployment: deployment removed. 05:27:35 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Create deployment with service account and verify relationships PASSED K8sRbacTest > Remove Service Account and verify it is removed STANDARD_OUT 05:27:35 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Remove Service Account and verify it is removed 05:27:35 | DEBUG | K8sRbacTest | ServiceAccountService | Waiting for Service Account removed 05:27:35 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Remove Service Account and verify it is removed PASSED K8sRbacTest > Verify scraped roles STANDARD_OUT 05:27:35 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Verify scraped roles 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-network-config-controller (openshift-cloud-network-config-controller) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-leader-election-role (openshift-catalogd) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-operator-etc-pki-entitlement (openshift-config-managed) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-controllers (openshift-config-managed) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aws-ebs-csi-driver-operator-aws-config-role (openshift-config-managed) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:oauth-servercert-trust (openshift-config-managed) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: ingress-operator (openshift-config) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-operator (openshift-config) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aws-ebs-csi-driver-lease-leader-election (openshift-cluster-csi-drivers) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: csi-snapshot-controller-operator-role (openshift-cluster-storage-operator) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-manager-role (openshift-config) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-dns) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-dns-operator) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-public (openshift-config-managed) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-ingress-operator) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: mcc-prometheus-k8s (openshift-machine-config-operator) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: marketplace-operator (openshift-marketplace) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: whereabouts-cni (openshift-multus) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-authentication) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-cluster-samples-operator) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-os-builder () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: metrics-daemon-role () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: network-diagnostics () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:operator:etcd-backup-role () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-image-registry-operator (openshift-image-registry) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-operator (openshift-machine-api) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-config-daemon (openshift-machine-config-operator) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-alertmanager-view (openshift-monitoring) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-node-tuning:tuned () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-node-limited (openshift-ovn-kubernetes) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: shared-resource-viewer (openshift) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: use-scanner-scc (stackrox) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:leader-locking-openshift-controller-manager (openshift-controller-manager) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: dns-operator (openshift-dns-operator) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-network-diagnostics) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-kube-controller-manager-operator) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: mcd-prometheus-k8s (openshift-machine-config-operator) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: alert-routing-edit () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-monitoring-metrics-api (openshift-monitoring) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: host-networking-services (openshift-openstack-infra) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-monitoring-operator-alert-customization (openshift-monitoring) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: ebs-privileged-role () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-monitoring) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: rhacs-operator.v4.10.0-207-g071f40eed6 (stackrox-operator) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: centrals.platform.stackrox.io-v1alpha1-admin () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: loki-promtail-oauth () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.global-operators.admin-3gjDVezhGPF6RBtOOpjEpDpKqO39v3NK8r4hmc () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-cloud-controller-manager (kube-system) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus (openshift-cluster-storage-operator) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-cloud-controller-manager (openshift-config) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aggregate-olm-edit () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: centrals.platform.stackrox.io-v1alpha1-edit () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:create-events () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-operator:cluster-reader () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securitypolicies.config.stackrox.io-v1alpha1-crdview () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:deployer-controller () 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:bootstrap-signer (kube-public) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-approver (openshift-cluster-machine-approver) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-cluster-node-tuning-operator) 05:27:36 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-cluster-version) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-approver (openshift-config-managed) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-network-public-role (openshift-config-managed) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: ingress-operator (openshift-ingress-operator) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-alertmanager-api-reader (openshift-user-workload-monitoring) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-user-workload-monitoring) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-udn-editor () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s-machine-api-operator (openshift-machine-api) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system::leader-locking-kube-controller-manager (kube-system) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:token-cleaner (kube-system) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-cloud-controller-manager (openshift-config-managed) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: coreos-pull-secret-reader (openshift-config) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-console-operator) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: storage-admin () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:volume-scheduler () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:route-controller () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:ttl-after-finished-controller () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:image-trigger-controller () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: pod-metrics-reader () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: self-provisioner () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:cloud-provider (kube-system) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: host-networking-services (openshift-nutanix-infra) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-autoscaler (openshift-machine-api) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-configmap-reader (openshift-config-managed) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.openshift-cluster-monitoring.view-9QCGFNcofBHQ2DeWEf2qFa4NWqTOGskUedO4Tz () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:sa-listing-configmaps (openshift-kube-scheduler) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s-cluster-autoscaler-operator (openshift-machine-api) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-operator (openshift-monitoring) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-manager-role () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: packagemanifests-v1-view () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:image-puller () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node-config-reader (openshift-node) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: user-workload-monitoring-config-edit (openshift-user-workload-monitoring) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: copied-csv-viewer (openshift) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: alertmanager-main () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: centrals.platform.stackrox.io-v1alpha1-view () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:review-tokens () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:certificates.k8s.io:kubelet-serving-approver () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:image-builder () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-operator () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-controller-manager (kube-system) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-cloud-credential-operator) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-controller-manager) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-etcd-operator) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-etcd) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: node-ca (openshift-image-registry) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-operator (openshift-insights) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:service-ingress-ip-controller () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:hostmount-anyuid-v2 () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-lifecycle-manager-metrics (openshift-operator-lifecycle-manager) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-autoscaler () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: promtail-prometheus (openshift-e2e-loki) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:sa-creating-openshift-controller-manager (openshift-infra) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:service-ca (openshift-service-ca) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-operator-obfuscation-secret (openshift-insights) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: control-plane-machine-set-operator (openshift-machine-api) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-controllers (openshift-machine-api) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openstack-cloud-controller-manager () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:auth-delegator () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:openshift-controller-manager:image-trigger-controller () 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-apiserver-operator) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-metrics-monitor-role (openshift-catalogd) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-apiserver) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-credential-operator-role (openshift-cloud-credential-operator) 05:27:37 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-multus) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-route-controller-manager) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: host-networking-services (openshift-vsphere-infra) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-config-controller-events () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: rhacs-operator.v4.10.0-2-cFI65PZq4WP2wtLvLTw48iFtjWj1jRslWj6gi0 (stackrox-operator) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ingress-router () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-operator () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aws-creds-secret-reader (kube-system) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-monitoring-operator-namespaced () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-provisioner-volumesnapshot-reader-role () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: registry-editor () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-machine-config-operator) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: network-diagnostics (openshift-network-diagnostics) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: packageserver (openshift-operator-lifecycle-manager) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-service-ca-operator) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-main-attacher-role () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: rhacs-operator-metrics-reader () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: privileged-scc-use (prefetch-images) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:resourcequota-controller () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-manager-role (openshift-config) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-authentication-operator) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: rhacs-operator.v4.10.0-2-cFI65PZq4WP2wtLvLTw48iFtjWj1jRslWj6gi0 () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:certificates.k8s.io:legacy-unknown-approver () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:horizontal-pod-autoscaler () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:openshift-route-controller-manager () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:restricted () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:hostmount-anyuid () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node-bootstrapper () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:tokenreview-openshift-route-controller-manager () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:build-config-change-controller () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:template-instance-finalizer-controller () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (kube-system) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: registry-monitoring () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-manager-role (openshift-catalogd) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-metrics-monitor-role (openshift-operator-controller) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-alertmanager-api-writer (openshift-user-workload-monitoring) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox-central-diagnostics (stackrox) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:leader-election-lock-cluster-policy-controller (openshift-kube-controller-manager) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-operator (openshift-console) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-config-daemon () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: pod-identity-webhook () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (default) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aws-ebs-csi-driver-operator-role (openshift-cluster-csi-drivers) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-config-operator) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-credential-operator-role (openshift-config) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-ingress) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: use-central-db-scc (stackrox) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: use-privileged-scc (stackrox) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-clusterextension-viewer-role () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s-config (openshift-monitoring) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: extension-apiserver-authentication-reader (kube-system) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-autoscaler-operator () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-autoscaler-operator:cluster-reader () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-samples-operator-proxy-reader () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: host-networking-services (openshift-kni-infra) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-operator (openshift-console-operator) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-leader-election-role (openshift-operator-controller) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-marketplace-metrics (openshift-marketplace) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.all-namespaces-operator-group.edit-1XZ7hjnJuDBg4AghiumYPXid5VzTcTonVHMeBJ () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: admin () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-user-settings-admin (openshift-console-user-settings) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-image-registry) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:bootstrap-signer (kube-system) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-insights) 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-status () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-runtime-extractor-role () 05:27:38 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: net-attach-def-project () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operatorhub-config-reader () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-alertmanager-edit (openshift-monitoring) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: network-node-identity-leases (openshift-network-node-identity) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-oauth-apiserver) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system::leader-locking-kube-scheduler (kube-system) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:sa-creating-route-controller-manager (openshift-infra) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-cluster-machine-approver) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-samples-operator (openshift-cluster-samples-operator) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-control-plane-limited (openshift-ovn-kubernetes) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:leader-locking-openshift-route-controller-manager (openshift-route-controller-manager) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-rules-edit () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.global-operators.edit-aFTmGKi9ZRUPJ2Dsphpd4NvovRSYjV3grbNdzM () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-main-resizer-role () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-provisioner-volumeattributesclass-reader-role () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-main-provisioner-role () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: router-monitoring () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-kube-apiserver-operator) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-cloud-controller-manager (openshift-cloud-controller-manager-operator) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: csi-snapshot-controller-leaderelection (openshift-cluster-storage-operator) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-operator (openshift-config-managed) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-baremetal-operator (openshift-machine-api) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-os-builder-events () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ingress-operator () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-reader () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: edit () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:image-import-controller () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:public-info-viewer () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-controller-manager (openshift-cloud-controller-manager) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: pod-identity-webhook (openshift-cloud-credential-operator) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aws-ebs-csi-driver-prometheus (openshift-cluster-csi-drivers) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-credential-operator-role (openshift-config-managed) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-kube-controller-manager) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s-cluster-baremetal-operator (openshift-machine-api) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: basic-user () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: edit (stackrox) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: watch-config (stackrox) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:useroauthaccesstoken-manager () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.olm-operators.admin-cJW3ICOZ9Osn3oPCTb13AVfBqppCRcP8pbQVFI () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.olm-operators.view-8emcFsHayyHMQwkcnb9OTLvkbp0RUOKtlNrGsV () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-kube-scheduler-operator) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-kube-scheduler) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securedclusters.platform.stackrox.io-v1alpha1-edit () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:replicaset-controller () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:endpointslice-controller () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:validatingadmissionpolicy-status-controller () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-control-plane-limited () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-ovn-kubernetes) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:aggregate-to-admin () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-provisioner-volumeattachment-reader-role () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-snapshot-controller-runner () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securedclusters.platform.stackrox.io-v1alpha1-admin () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:certificate-controller () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:monitoring () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-to-storage-admin () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:cloud-credential-operator:cluster-reader () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: csi-snapshot-controller-operator-clusterrole () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-controller-manager-operator) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-kube-apiserver) 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-operator () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-operator-ext-remediation () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-edit () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: network-node-identity () 05:27:39 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: node-exporter () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-snapshots-to-admin () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: central-prometheus-k8s (stackrox) 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-metrics-reader () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-controllers-metal3-remediation () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-autoscaler-operator (openshift-machine-api) 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-node-limited () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: rhacs-operator.v4.10.0-20-utVZ3mRxcesDKyW3DDu9w7ps6CPBZ98QV6K3j () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:build-strategy-jenkinspipeline () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:ephemeral-volume-controller () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-samples-operator () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-operator () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-network-operator) 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-manager-role (openshift-operator-controller) 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-proxy-role () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-resizer-storageclass-reader-role () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:certificates.k8s.io:kube-apiserver-client-approver () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:clusterrole-aggregation-controller () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:pv-protection-controller () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:podsecurity-admission-label-syncer-controller () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-monitoring-operator () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-node-tuning-operator () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-node-manager () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: multus-admission-controller-webhook () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.all-namespaces-operator-group.admin-9gE7IN5P50qJYufUKuJLTNPMsUxktd1gmKyfHl () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: whereabouts-cni () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: multus () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:build-strategy-docker () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-udn-viewer () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:namespace-controller () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node-problem-detector () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:hostnetwork-v2 () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: collect-profiles (openshift-operator-lifecycle-manager) 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aws-ebs-csi-driver-operator-clusterrole () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-config-controller () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: config-controller-manager-role (stackrox) 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-extensions-reader () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: dns-monitoring () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:kube-dns () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:template-instance-controller () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:cronjob-controller () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: registry-admin () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-controller-manager () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-baremetal-operator () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:image-pusher () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: secured-cluster-prometheus-k8s (stackrox) 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-cluster-reader () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-network-config-controller () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node-reader () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:cluster-samples-operator:cluster-reader () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-operator-gather () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: packageserver-service-cert (openshift-operator-lifecycle-manager) 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: 2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a308555a521c (stackrox-operator) 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: centrals.platform.stackrox.io-v1alpha1-crdview () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-admin () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-debugger () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-image-registry-operator () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-monitoring-view () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: project-helm-chartrepository-editor () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:sdn-manager () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:webhook () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:image-signer () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:aggregate-to-view () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:aggregated-metrics-reader () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:certificates.k8s.io:certificatesigningrequests:nodeclient () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:expand-controller () 05:27:40 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:volumeattributesclass-protection-controller () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:discovery () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node-proxier () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-to-admin () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:nested-container () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: thanos-querier () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: volume-data-source-validator () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.olm-operators.edit-bVVJnBj37eRvbI1svBxms0t0mdsKB26cTBQYrx () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-dns-operator () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-kube-rbac-proxy () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:restricted-v3 () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:operator-lifecycle-manager () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-metrics-reader () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:service-ca-cert-publisher () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:network-policies () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:default-rolebindings-controller () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:machine-approver () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:templateservicebroker-client () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-iptables-alerter () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:deployment-controller () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: packagemanifests-v1-edit () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: control-plane-machine-set-operator () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s-scheduler-resources () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:certificates.k8s.io:kube-apiserver-client-kubelet-approver () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-olm-operator () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: helm-chartrepos-viewer () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: kube-state-metrics () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-rules-view () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: marketplace-operator () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.all-namespaces-operator-group.view-Hy693YLeM7VQ6B0sFlnElNFvDiMAUfUubKraf () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.openshift-cluster-monitoring.admin-2SOrzhaSHllEqB6Becsc9Z2BniBuXZxdBrPmIq () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.openshift-cluster-monitoring.edit-brB9auo7mhdQtycRdrSZm5XlKKbUjCe698FPlD () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:template-service-broker () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-to-basic-user () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: packagemanifests-v1-admin () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: view () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:cluster-config-operator:cluster-reader () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:registry () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:gateway-api:aggregate-to-view () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:edit-compliance () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:disruption-controller () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-samples-operator-imageconfig-reader () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:kubelet-api-admin () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securitypolicies.config.stackrox.io-v1alpha1-view () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-to-view () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: registry-viewer () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:serviceaccount-controller () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:statefulset-controller () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: kube-apiserver () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: loki-promtail () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-config-server () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-provisioner-configmap-and-secret-reader-role () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:operator:cloud-controller-manager () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:check-endpoints-crd-reader () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:check-endpoints-node-reader () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:horizontal-pod-autoscaler () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:build-controller () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:persistent-volume-provisioner () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:check-endpoints () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:resourcequota-controller () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securedclusters.platform.stackrox.io-v1alpha1-crdview () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: self-access-reviewer () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-dns () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-credential-operator-role () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-state-metrics () 05:27:41 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:job-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-lifecycle-manager-metrics-reader () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:unidling-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:kube-controller-manager () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:attachdetach-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: central-sts-config-reader (stackrox) 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-proxy-role () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securitypolicies.config.stackrox.io-v1alpha1-edit () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:replication-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:serviceaccount-pull-secrets-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:deploymentconfig-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:update-namespaces () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:cluster-csr-approver-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:build-strategy-source () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:oauth-token-deleter () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:node-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-to-edit () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:daemon-set-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: ebs-kube-rbac-proxy-role () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-controllers-metal3-remediation-aggregation () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-config-daemon-events () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.global-operators.view-blsDheftOYMzHYeJbysGRVymD2Yx8MmrS7Yi0E () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:machine-config-operator:cluster-reader () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:nonroot () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:origin-namespace-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:public-info-viewer () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:root-ca-cert-publisher () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-controllers () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node-admin () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:cluster-quota-reconciliation-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:aggregate-to-edit () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:gateway-api:aggregate-to-admin () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-resizer-volumeattributesclass-reader-role () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:persistent-volume-binder () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:endpoint-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:kube-aggregator () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: multus-ancillary-tools () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:pod-garbage-collector () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:privileged-namespaces-psa-label-syncer () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:discovery () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:build-strategy-custom () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:endpointslicemirroring-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:legacy-service-account-token-cleaner () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securedclusters.platform.stackrox.io-v1alpha1-view () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:pvc-protection-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securitypolicies.config.stackrox.io-v1alpha1-admin () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:image-auditor () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: sudoer () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:image-pruner () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-main-snapshotter-role () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:namespace-security-allocation-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:openshift-controller-manager () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:nonroot-v2 () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:privileged () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:service-cidrs-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:ttl-controller () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:basic-user () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-snapshots-to-view () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:generic-garbage-collector () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:scope-impersonation () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-operator (openshift-config) 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-controllers (openshift-config) 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-console) 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: use-central-scc (stackrox) 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aggregate-olm-view () 05:27:42 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-manager-role () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:metrics-server () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:service-ca () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:hostmount () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:sdn-reader () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:selinux-warning-controller () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:hostnetwork () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:deployer () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:service-account-issuer-discovery () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-snapshots-to-basic-user () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-snapshots-to-storage-admin () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:pv-recycler-controller () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:hostaccess () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:restricted-v2 () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:tokenreview-openshift-controller-manager () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:router () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:kube-scheduler () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:master () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-to-cluster-reader () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:openshift-controller-manager:ingress-to-route-controller () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:openshift-controller-manager:update-buildconfig-status () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:anyuid () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:service-controller () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:heapster () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: test-role (qa) 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:edit-workloads () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:view-cluster () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:certificates.k8s.io:certificatesigningrequests:selfnodeclient () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:service-account-controller () 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Verify scraped roles PASSED K8sRbacTest > Add Role and verify it gets scraped STANDARD_OUT 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Add Role and verify it gets scraped 05:27:43 | DEBUG | K8sRbacTest | RbacService | Waiting for Role 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Add Role and verify it gets scraped PASSED K8sRbacTest > Remove Role and verify it is removed STANDARD_OUT 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Remove Role and verify it is removed 05:27:43 | DEBUG | K8sRbacTest | RbacService | Waiting for Role removed 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Remove Role and verify it is removed PASSED K8sRbacTest > Add Cluster Role and verify it gets scraped STANDARD_OUT 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Add Cluster Role and verify it gets scraped 05:27:43 | DEBUG | K8sRbacTest | RbacService | Waiting for Role 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Add Cluster Role and verify it gets scraped PASSED K8sRbacTest > Remove Cluster Role and verify it is removed STANDARD_OUT 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Remove Cluster Role and verify it is removed 05:27:43 | DEBUG | K8sRbacTest | RbacService | Waiting for Role removed 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Remove Cluster Role and verify it is removed PASSED K8sRbacTest > Verify scraped bindings STANDARD_OUT 05:27:43 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Verify scraped bindings 05:27:43 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:27:55 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Verify scraped bindings PASSED K8sRbacTest > Verify returned subject list is complete STANDARD_OUT 05:27:55 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Verify returned subject list is complete 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Verify returned subject list is complete PASSED K8sRbacTest > Add Binding with role ref and verify it gets scraped STANDARD_OUT 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Add Binding with role ref and verify it gets scraped 05:28:06 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding 05:28:06 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Add Binding with role ref and verify it gets scraped PASSED K8sRbacTest > Remove Binding with role ref and verify it is removed STANDARD_OUT 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Remove Binding with role ref and verify it is removed 05:28:06 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding removed 05:28:06 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Remove Binding with role ref and verify it is removed PASSED K8sRbacTest > Add Binding with cluster role ref and verify it gets scraped STANDARD_OUT 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Add Binding with cluster role ref and verify it gets scraped 05:28:06 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding 05:28:06 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Add Binding with cluster role ref and verify it gets scraped PASSED K8sRbacTest > Remove Binding with cluster role ref and verify it is removed STANDARD_OUT 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Remove Binding with cluster role ref and verify it is removed 05:28:06 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding removed 05:28:06 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Remove Binding with cluster role ref and verify it is removed PASSED K8sRbacTest > Add cluster Binding and verify it gets scraped STANDARD_OUT 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Add cluster Binding and verify it gets scraped 05:28:06 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding 05:28:06 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Add cluster Binding and verify it gets scraped PASSED K8sRbacTest > Remove cluster Binding and verify it is removed STANDARD_OUT 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Remove cluster Binding and verify it is removed 05:28:06 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding removed 05:28:06 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Remove cluster Binding and verify it is removed PASSED K8sRbacTest STANDARD_OUT 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Ending testsuite 05:28:06 | INFO | K8sRbacTest | K8sRbacTest | Checking if cluster is healthy after test 05:28:06 | DEBUG | K8sRbacTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries LocalQaPropsTest > CheckPropertyFileInputValue > GOOGLE_CREDENTIALS_GCR_SCANNER_V2 SKIPPED LocalQaPropsTest > CheckPropertyFileInputValue > GOOGLE_CREDENTIALS_GCR_NO_ACCESS_KEY_V2 SKIPPED NamespaceTest STANDARD_OUT 05:28:06 | INFO | NamespaceTest | NamespaceTest | Starting testsuite NamespaceTest > Verify namespace details STANDARD_OUT 05:28:06 | INFO | NamespaceTest | NamespaceTest | Starting testcase: Verify namespace details 05:28:06 | INFO | NamespaceTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:28:06 | INFO | NamespaceTest | NamespaceTest | Ending testcase NamespaceTest > Verify namespace details SKIPPED NamespaceTest STANDARD_OUT 05:28:06 | INFO | NamespaceTest | NamespaceTest | Ending testsuite 05:28:06 | INFO | NamespaceTest | NamespaceTest | Checking if cluster is healthy after test 05:28:06 | DEBUG | NamespaceTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries NetworkBaselineTest STANDARD_OUT 05:28:06 | INFO | NetworkBaselineTest | NetworkBaselineTest | Starting testsuite NetworkBaselineTest > Verify network baseline functionality STANDARD_OUT 05:28:06 | INFO | NetworkBaselineTest | NetworkBaselineTest | Starting testcase: Verify network baseline functionality 05:28:07 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:28:07 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-server service created 05:28:07 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-server 05:28:07 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:28:07 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-client-baselined 05:28:07 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-server to start 05:28:07 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-server's pods: 05:28:07 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-server-6946f95f79-4t2kv Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:28:07 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for net-bl-server 05:28:10 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-server to start 05:28:10 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-server's pods: 05:28:10 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-server-6946f95f79-4t2kv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:28:07Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:28:10 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-server 05:28:10 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment net-bl-server 05:28:10 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-server with 1 pods 05:28:10 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-baselined to start 05:28:10 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-baselined's pods: 05:28:10 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-client-baselined-5787b59ff4-xgrxs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:28:07Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:28:10 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-client-baselined 05:28:10 | DEBUG | NetworkBaselineTest | Kubernetes | Took 0 seconds for k8s deployment net-bl-client-baselined 05:28:10 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-client-baselined with 1 pods 05:28:10 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-server within 0s 05:28:10 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-client-baselined within 0s 05:28:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Source Id 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17 -> edge target key: 3 05:28:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> targetId: ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761888526.53151707 05:28:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Found source 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17 -> target ad8ec288-0a8f-4345-b8e9-4d267b4cca46 in graph after 35.74s 05:28:46 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:28:46 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-client-anomalous 05:28:46 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-anomalous to start 05:28:46 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-anomalous's pods: 05:28:46 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-client-anomalous-84996b6c9c-d7xgj Container status: [] 05:28:46 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for net-bl-client-anomalous 05:28:49 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-anomalous to start 05:28:49 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-anomalous's pods: 05:28:49 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-client-anomalous-84996b6c9c-d7xgj Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:28:46Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:28:49 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-client-anomalous 05:28:49 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment net-bl-client-anomalous 05:28:49 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-client-anomalous with 1 pods 05:28:49 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-client-anomalous within 0s 05:28:49 | INFO | NetworkBaselineTest | NetworkBaselineTest | Deployment IDs Server: ad8ec288-0a8f-4345-b8e9-4d267b4cca46, Baselined client: 7fd1c349-d684-45e8-b6c9-10ecc7eb8e17, Anomalous client: 7c3d53d5-a58b-42d8-ab39-1606dd499f72 05:28:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:28:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:28:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:29:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:29:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:30:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:30:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:31:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:31:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:32:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:32:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 7c3d53d5-a58b-42d8-ab39-1606dd499f72, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:33:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Source Id 7c3d53d5-a58b-42d8-ab39-1606dd499f72 -> edge target key: 1 05:33:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> targetId: ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:33:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761888825.541906244 05:33:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Found source 7c3d53d5-a58b-42d8-ab39-1606dd499f72 -> target ad8ec288-0a8f-4345-b8e9-4d267b4cca46 in graph after 296.334s 05:33:45 | INFO | NetworkBaselineTest | NetworkBaselineTest | Anomalous Baseline: deployment_id: "7c3d53d5-a58b-42d8-ab39-1606dd499f72" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761888646 nanos: 126302000 } deployment_name: "net-bl-client-anomalous" 05:33:45 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:33:45 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-client-deferred-baselined 05:33:45 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-deferred-baselined to start 05:33:45 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-deferred-baselined's pods: 05:33:45 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-client-deferred-baselined-6d87cc64d-4244r Container status: [] 05:33:45 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for net-bl-client-deferred-baselined 05:33:48 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-deferred-baselined to start 05:33:48 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-deferred-baselined's pods: 05:33:48 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-client-deferred-baselined-6d87cc64d-4244r Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:33:46Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:33:48 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-client-deferred-baselined 05:33:48 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment net-bl-client-deferred-baselined 05:33:48 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-client-deferred-baselined with 1 pods 05:33:48 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-client-deferred-baselined within 0s 05:33:48 | INFO | NetworkBaselineTest | NetworkBaselineTest | Deferred Baseline: f11d01f2-704f-49e3-9db1-d34ae078e890 05:33:48 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 0 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:33:52 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 1 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:33:56 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 2 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:00 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 3 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:04 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 4 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:08 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 5 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:12 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 6 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:16 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 7 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:20 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 8 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:24 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 9 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:29 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 10 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:33 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 11 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:37 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 12 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:41 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 13 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:45 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 14 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:49 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 15 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:53 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 16 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:34:57 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 17 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:35:01 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 18 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:35:05 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 19 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:35:09 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 20 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:35:13 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 21 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:35:17 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 22 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:35:21 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 23 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:35:25 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 24 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:35:29 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 25 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:35:33 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 26 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:35:37 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 27 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:35:41 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 28 of 30): java.lang.RuntimeException: Baseline f11d01f2-704f-49e3-9db1-d34ae078e890 is in observation. Baseline is deployment_id: "f11d01f2-704f-49e3-9db1-d34ae078e890" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "ad8ec288-0a8f-4345-b8e9-4d267b4cca46" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761888945 nanos: 715045000 } deployment_name: "net-bl-client-deferred-baselined" 05:35:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId f11d01f2-704f-49e3-9db1-d34ae078e890, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:35:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:35:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Source Id f11d01f2-704f-49e3-9db1-d34ae078e890 -> edge target key: 4 05:35:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> targetId: ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:35:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761888945.362930207 05:35:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Found source f11d01f2-704f-49e3-9db1-d34ae078e890 -> target ad8ec288-0a8f-4345-b8e9-4d267b4cca46 in graph after 0.047s 05:35:45 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:35:45 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-client-post-lock 05:35:45 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-post-lock to start 05:35:45 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-post-lock's pods: 05:35:45 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-client-post-lock-c8f868d79-f5s2p Container status: [] 05:35:45 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for net-bl-client-post-lock 05:35:48 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-post-lock to start 05:35:48 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-post-lock's pods: 05:35:48 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-client-post-lock-c8f868d79-f5s2p Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:35:46Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:35:48 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-client-post-lock 05:35:48 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment net-bl-client-post-lock 05:35:48 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-client-post-lock with 1 pods 05:35:48 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-client-post-lock within 0s 05:35:48 | INFO | NetworkBaselineTest | NetworkBaselineTest | Post Lock Deployment: a3f180d3-5578-4ccc-87f5-41edc84ac5b4 05:35:48 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 0 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:35:52 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 1 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:35:56 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 2 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:00 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 3 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:04 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 4 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:08 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 5 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:12 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 6 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:16 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 7 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:20 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 8 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:24 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 9 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:28 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 10 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:32 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 11 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:36 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 12 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:40 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 13 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:44 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 14 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:48 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 15 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:52 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 16 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:36:56 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 17 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:37:00 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 18 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:37:04 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 19 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:37:08 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 20 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:37:12 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 21 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:37:16 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 22 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:37:21 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 23 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:37:25 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 24 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:37:29 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 25 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:37:33 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 26 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:37:37 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 27 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:37:41 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 28 of 30): java.lang.RuntimeException: Baseline a3f180d3-5578-4ccc-87f5-41edc84ac5b4 is not out of observation yet. Baseline is deployment_id: "a3f180d3-5578-4ccc-87f5-41edc84ac5b4" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" observation_period_end { seconds: 1761889065 nanos: 528269000 } deployment_name: "net-bl-client-post-lock" 05:37:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId a3f180d3-5578-4ccc-87f5-41edc84ac5b4, targetId ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:37:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Source Id a3f180d3-5578-4ccc-87f5-41edc84ac5b4 -> edge target key: 4 05:37:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> targetId: ad8ec288-0a8f-4345-b8e9-4d267b4cca46 05:37:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889065.140510074 05:37:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Found source a3f180d3-5578-4ccc-87f5-41edc84ac5b4 -> target ad8ec288-0a8f-4345-b8e9-4d267b4cca46 in graph after 0.048s 05:37:45 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:37:45 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-user-server service created 05:37:45 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-user-server 05:37:45 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-user-server to start 05:37:45 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-user-server's pods: 05:37:45 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-user-server-647f7f887f-cxgs5 Container status: [] 05:37:45 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for net-bl-user-server 05:37:48 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-user-server to start 05:37:48 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-user-server's pods: 05:37:48 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-user-server-647f7f887f-cxgs5 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:37:46Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:37:48 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-user-server 05:37:48 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment net-bl-user-server 05:37:48 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-user-server with 1 pods 05:37:48 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-user-server within 0s 05:37:48 | INFO | NetworkBaselineTest | NetworkBaselineTest | Deployment IDs Server: 6623dfa3-e22f-4178-9691-617e2378836e 05:37:48 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:37:48 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-user-client-baselined 05:37:48 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-user-client-baselined to start 05:37:48 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-user-client-baselined's pods: 05:37:48 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-user-client-baselined-79f5ff6d9b-5z9ln Container status: [] 05:37:48 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for net-bl-user-client-baselined 05:37:51 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-user-client-baselined to start 05:37:51 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-user-client-baselined's pods: 05:37:51 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-user-client-baselined-79f5ff6d9b-5z9ln Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:37:49Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:37:51 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-user-client-baselined 05:37:51 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment net-bl-user-client-baselined 05:37:51 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-user-client-baselined with 1 pods 05:37:51 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-user-client-baselined within 0s 05:37:51 | INFO | NetworkBaselineTest | NetworkBaselineTest | Client deployment: c2a09f9e-b3e1-4d0c-a211-73110f680649 05:37:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:37:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:37:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:37:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:37:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:37:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:37:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:37:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:37:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c2a09f9e-b3e1-4d0c-a211-73110f680649, targetId 6623dfa3-e22f-4178-9691-617e2378836e 05:38:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Source Id c2a09f9e-b3e1-4d0c-a211-73110f680649 -> edge target key: 6 05:38:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> targetId: 6623dfa3-e22f-4178-9691-617e2378836e 05:38:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889095.816948895 05:38:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Found source c2a09f9e-b3e1-4d0c-a211-73110f680649 -> target 6623dfa3-e22f-4178-9691-617e2378836e in graph after 24.134s 05:38:15 | INFO | NetworkBaselineTest | NetworkBaselineTest | Server Baseline: deployment_id: "6623dfa3-e22f-4178-9691-617e2378836e" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "c2a09f9e-b3e1-4d0c-a211-73110f680649" deployment { name: "net-bl-user-client-baselined" } } } properties { ingress: true port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761889185 nanos: 311232000 } deployment_name: "net-bl-user-server" 05:38:15 | INFO | NetworkBaselineTest | NetworkBaselineTest | Client Baseline: deployment_id: "c2a09f9e-b3e1-4d0c-a211-73110f680649" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "6623dfa3-e22f-4178-9691-617e2378836e" deployment { name: "net-bl-user-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1761889188 nanos: 584354000 } deployment_name: "net-bl-user-client-baselined" 05:38:15 | INFO | NetworkBaselineTest | NetworkBaselineTest | Deleting the deployments. 05:38:15 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-server: Service deleting... 05:38:15 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-server: Service deleted 05:38:15 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-server 05:38:15 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-baselined 05:38:15 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-user-server: Service deleting... 05:38:15 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-user-server: Service deleted 05:38:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-user-server 05:38:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-user-client-baselined 05:38:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-anomalous 05:38:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-deferred-baselined 05:38:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-post-lock 05:38:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: multiple-external-destination-source 05:38:21 | DEBUG | NetworkBaselineTest | Kubernetes | collector-config: ConfigMap removed. 05:38:21 | INFO | NetworkBaselineTest | NetworkBaselineTest | Ending testcase NetworkBaselineTest > Verify network baseline functionality PASSED NetworkBaselineTest > Verify network baseline functionality with multiple external entities STANDARD_OUT 05:38:21 | INFO | NetworkBaselineTest | NetworkBaselineTest | Starting testcase: Verify network baseline functionality with multiple external entities 05:38:21 | DEBUG | NetworkBaselineTest | Kubernetes | collector-config: ConfigMap created. 05:38:21 | INFO | NetworkBaselineTest | CollectorUtil | Waiting for Collector Config propagation (6 pods) 05:38:27 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@2fd08e54, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@3c4f29c1, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@46d26476, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@4876983d, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@637f0d49, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@26bb21c6] 05:38:35 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@2fd08e54, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@3c4f29c1, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@46d26476, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@4876983d, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@637f0d49, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@26bb21c6] 05:38:42 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@2fd08e54, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@3c4f29c1, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@46d26476, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@4876983d, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@637f0d49, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@26bb21c6] 05:38:50 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 3 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@2fd08e54, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@3c4f29c1, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@46d26476, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@637f0d49, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@26bb21c6] 05:38:56 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 4 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@3c4f29c1, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@46d26476, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@637f0d49] 05:39:00 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 5 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@637f0d49] 05:39:02 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 6 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@637f0d49] 05:39:04 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 7 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@637f0d49] 05:39:06 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 8 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@637f0d49] 05:39:08 | INFO | NetworkBaselineTest | CollectorUtil | Waited for 10 seconds for Collector runtime configuration to be updated 05:39:09 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:39:09 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace multiple-external-destination-source 05:39:09 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for multiple-external-destination-source to start 05:39:09 | DEBUG | NetworkBaselineTest | Kubernetes | Status of multiple-external-destination-source's pods: 05:39:09 | DEBUG | NetworkBaselineTest | Kubernetes | - multiple-external-destination-source-6549d759f6-knvz2 Container status: [] 05:39:09 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for multiple-external-destination-source 05:39:12 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for multiple-external-destination-source to start 05:39:12 | DEBUG | NetworkBaselineTest | Kubernetes | Status of multiple-external-destination-source's pods: 05:39:12 | DEBUG | NetworkBaselineTest | Kubernetes | - multiple-external-destination-source-6549d759f6-knvz2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:39:09Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:39:12 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for multiple-external-destination-source 05:39:12 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment multiple-external-destination-source 05:39:12 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment multiple-external-destination-source with 1 pods 05:39:12 | INFO | NetworkBaselineTest | Services | SR found deployment multiple-external-destination-source within 0s 05:39:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:39:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId ad7b574f-1c3c-4506-966e-ab203e325c6d, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:40:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Source Id ad7b574f-1c3c-4506-966e-ab203e325c6d -> edge target key: 145 05:40:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> targetId: afa12424-bde3-4313-b810-bb463cbe8f90 05:40:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 53 L4_PROTOCOL_TCP 1761889179.798492000 05:40:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889179.863249000 05:40:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Found source ad7b574f-1c3c-4506-966e-ab203e325c6d -> target afa12424-bde3-4313-b810-bb463cbe8f90 in graph after 63.845s 05:40:16 | INFO | NetworkBaselineTest | NetworkBaselineTest | Deleting the deployments. 05:40:16 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-server: Service deleting... 05:40:16 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-server: Service deleted 05:40:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-server 05:40:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-baselined 05:40:16 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-user-server: Service deleting... 05:40:16 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-user-server: Service deleted 05:40:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-user-server 05:40:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-user-client-baselined 05:40:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-anomalous 05:40:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-deferred-baselined 05:40:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-post-lock 05:40:16 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: multiple-external-destination-source 05:40:21 | DEBUG | NetworkBaselineTest | Kubernetes | collector-config: ConfigMap removed. 05:40:21 | INFO | NetworkBaselineTest | NetworkBaselineTest | Ending testcase NetworkBaselineTest > Verify network baseline functionality with multiple external entities PASSED NetworkBaselineTest STANDARD_OUT 05:40:21 | INFO | NetworkBaselineTest | NetworkBaselineTest | Ending testsuite 05:40:21 | INFO | NetworkBaselineTest | NetworkBaselineTest | Checking if cluster is healthy after test 05:40:21 | DEBUG | NetworkBaselineTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries NetworkFlowTest STANDARD_OUT 05:40:21 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testsuite 05:40:21 | DEBUG | NetworkFlowTest | Kubernetes | quay: secret created. 05:40:21 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:40:21 | DEBUG | NetworkFlowTest | Kubernetes | udp-connection-target service created 05:40:21 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace udp-connection-target 05:40:21 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:40:21 | DEBUG | NetworkFlowTest | Kubernetes | tcp-connection-target service created 05:40:21 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target 05:40:21 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:40:21 | DEBUG | NetworkFlowTest | Kubernetes | nginx-connection-target service created 05:40:21 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for LB external IP for nginx-connection-target 05:40:25 | DEBUG | NetworkFlowTest | Kubernetes | LB IP: abfa0b58ff3e7462192cb658a8ddd816-1132763508.XXXXXXXXX.elb.amazonaws.com 05:40:25 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace nginx-connection-target 05:40:25 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for LB external IP for nginx-connection-target 05:40:25 | DEBUG | NetworkFlowTest | Kubernetes | LB IP: abfa0b58ff3e7462192cb658a8ddd816-1132763508.XXXXXXXXX.elb.amazonaws.com 05:40:25 | DEBUG | NetworkFlowTest | OpenShift | Creating a route: nginx-connection-target 05:40:26 | DEBUG | NetworkFlowTest | OpenShift | Waiting for route: nginx-connection-target 05:40:26 | DEBUG | NetworkFlowTest | OpenShift | Route Host: nginx-connection-target-qa.apps.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for udp-connection-target to start 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | Status of udp-connection-target's pods: 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | - udp-connection-target-8498855dbd-xhw42 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:40:22Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for udp-connection-target 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment udp-connection-target 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment udp-connection-target with 1 pods 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for tcp-connection-target to start 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | Status of tcp-connection-target's pods: 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | - tcp-connection-target-5855c6f486-9jd75 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:40:22Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for tcp-connection-target 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment tcp-connection-target with 1 pods 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for nginx-connection-target to start 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | Status of nginx-connection-target's pods: 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | - nginx-connection-target-8678b6d5c5-pbc2t Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:40:26 | DEBUG | NetworkFlowTest | Kubernetes | 0/1 are in the ready state for nginx-connection-target 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for nginx-connection-target to start 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Status of nginx-connection-target's pods: 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | - nginx-connection-target-8678b6d5c5-pbc2t Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:40:26Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for nginx-connection-target 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Took 3 seconds for k8s deployment nginx-connection-target 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment nginx-connection-target with 1 pods 05:40:29 | INFO | NetworkFlowTest | Services | SR found deployment udp-connection-target within 0s 05:40:29 | INFO | NetworkFlowTest | Services | SR found deployment tcp-connection-target within 0s 05:40:29 | INFO | NetworkFlowTest | Services | SR found deployment nginx-connection-target within 0s 05:40:29 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace no-connection-source 05:40:29 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace short-consistent-source 05:40:29 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace single-connection-source 05:40:29 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace udp-connection-source 05:40:29 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-source 05:40:29 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace two-ports-connect-source 05:40:29 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace external-destination-source 05:40:29 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa2 already exists 05:40:29 | DEBUG | NetworkFlowTest | OpenShift | Adding system:serviceaccount:qa2:default to anyuid user list 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-source-qa2 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for no-connection-source to start 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | Status of no-connection-source's pods: 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | - no-connection-source-6567766fb-22m2d Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:40:29 | DEBUG | NetworkFlowTest | Kubernetes | 0/1 are in the ready state for no-connection-source 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for no-connection-source to start 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Status of no-connection-source's pods: 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | - no-connection-source-6567766fb-22m2d Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:40:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for no-connection-source 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Took 3 seconds for k8s deployment no-connection-source 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment no-connection-source with 1 pods 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for short-consistent-source to start 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Status of short-consistent-source's pods: 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | - short-consistent-source-57b5fc5c6b-g9qpc Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:40:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for short-consistent-source 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment short-consistent-source 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment short-consistent-source with 1 pods 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for single-connection-source to start 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Status of single-connection-source's pods: 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | - single-connection-source-74b67bdc87-v8v6q Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:40:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for single-connection-source 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment single-connection-source 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment single-connection-source with 1 pods 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for udp-connection-source to start 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Status of udp-connection-source's pods: 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | - udp-connection-source-6467557d99-wdz6b Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:40:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for udp-connection-source 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment udp-connection-source 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment udp-connection-source with 1 pods 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for tcp-connection-source to start 05:40:32 | DEBUG | NetworkFlowTest | Kubernetes | Status of tcp-connection-source's pods: 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | - tcp-connection-source-86468fcf9f-lrqjk Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:40:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for tcp-connection-source 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-source 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment tcp-connection-source with 1 pods 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for two-ports-connect-source to start 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Status of two-ports-connect-source's pods: 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | - two-ports-connect-source-6b787bf579-9dt8m Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:40:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for two-ports-connect-source 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment two-ports-connect-source 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment two-ports-connect-source with 1 pods 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for external-destination-source to start 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Status of external-destination-source's pods: 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | - external-destination-source-7bc6bd9bc7-lwlpt Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:40:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for external-destination-source 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment external-destination-source 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment external-destination-source with 1 pods 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for tcp-connection-source-qa2 to start 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Status of tcp-connection-source-qa2's pods: 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | - tcp-connection-source-qa2-64f46545bb-h9bdd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:40:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for tcp-connection-source-qa2 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-source-qa2 05:40:33 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment tcp-connection-source-qa2 with 1 pods 05:40:33 | INFO | NetworkFlowTest | Services | SR found deployment no-connection-source within 0s 05:40:33 | INFO | NetworkFlowTest | Services | SR found deployment short-consistent-source within 0s 05:40:33 | INFO | NetworkFlowTest | Services | SR found deployment single-connection-source within 0s 05:40:33 | INFO | NetworkFlowTest | Services | SR found deployment udp-connection-source within 0s 05:40:33 | INFO | NetworkFlowTest | Services | SR found deployment tcp-connection-source within 0s 05:40:33 | INFO | NetworkFlowTest | Services | SR found deployment two-ports-connect-source within 0s 05:40:33 | INFO | NetworkFlowTest | Services | SR found deployment external-destination-source within 0s 05:40:33 | INFO | NetworkFlowTest | Services | SR found deployment tcp-connection-source-qa2 within 0s NetworkFlowTest > Verify one-time connections show at first and are closed after the afterglow period STANDARD_OUT 05:40:33 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify one-time connections show at first and are closed after the afterglow period 05:40:33 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between single-connection-source and nginx-connection-target 05:40:33 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:33 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:34 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:34 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:35 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:35 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:36 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:36 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:37 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:37 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:38 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:38 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:39 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:39 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:42 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:42 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:44 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:44 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:46 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:46 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:47 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:47 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:50 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:50 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:51 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:51 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:52 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:52 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:53 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:53 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:54 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:54 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:55 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:55 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:56 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:56 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:57 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:57 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:58 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:58 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:59 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:40:59 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:00 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:00 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:01 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:01 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:02 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:02 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:03 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:03 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:04 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:04 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:05 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:05 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:06 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:06 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:07 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:07 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:08 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:08 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:09 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:09 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:10 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:10 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:11 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:11 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:12 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:12 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:14 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:14 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa -> edge target key: 3 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889230.202892000 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa -> target 0639a7c0-33c7-4cf6-8a04-a02087ed1737 in graph after 41.79s 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa -> edge target key: 3 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889230.202892000 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify one-time connections show at first and are closed after the afterglow period PASSED NetworkFlowTest > Verify connections between StackRox Services STANDARD_OUT 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify connections between StackRox Services 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between sensor and central 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId f1bf399c-f5ee-4971-af26-73ef082f7577, targetId ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id f1bf399c-f5ee-4971-af26-73ef082f7577 -> edge target key: 2 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1761889275.233554067 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source f1bf399c-f5ee-4971-af26-73ef082f7577 -> target ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 in graph after 0.044s 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between collector and sensor 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 20231452-e84e-4a63-a2ac-53ed01493ff5, targetId f1bf399c-f5ee-4971-af26-73ef082f7577 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 20231452-e84e-4a63-a2ac-53ed01493ff5 -> edge target key: 17 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: f1bf399c-f5ee-4971-af26-73ef082f7577 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1761889275.277087725 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source 20231452-e84e-4a63-a2ac-53ed01493ff5 -> target f1bf399c-f5ee-4971-af26-73ef082f7577 in graph after 0.043s 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify connections between StackRox Services PASSED NetworkFlowTest > Verify ports are greater than 0 SKIPPED NetworkFlowTest > Verify connections can be detected: #protocol > Verify connections can be detected: L4_PROTOCOL_UDP STANDARD_OUT 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify connections can be detected: L4_PROTOCOL_UDP 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between udp-connection-source and udp-connection-target 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId eb640c8d-0145-4d01-b258-c715ac349083, targetId 7f41cbb1-0c56-460d-b7bb-e22c1818c76b 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id eb640c8d-0145-4d01-b258-c715ac349083 -> edge target key: 9 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 7f41cbb1-0c56-460d-b7bb-e22c1818c76b 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 8080 L4_PROTOCOL_UDP 1761889275.335969766 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source eb640c8d-0145-4d01-b258-c715ac349083 -> target 7f41cbb1-0c56-460d-b7bb-e22c1818c76b in graph after 0.041s 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify connections can be detected: #protocol > Verify connections can be detected: L4_PROTOCOL_UDP PASSED NetworkFlowTest > Verify connections can be detected: #protocol > Verify connections can be detected: L4_PROTOCOL_TCP STANDARD_OUT 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify connections can be detected: L4_PROTOCOL_TCP 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between tcp-connection-source and tcp-connection-target 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0762f344-8c28-4835-b83d-d3bbd019f499, targetId 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 0762f344-8c28-4835-b83d-d3bbd019f499 -> edge target key: 8 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889275.395459232 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source 0762f344-8c28-4835-b83d-d3bbd019f499 -> target 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 in graph after 0.041s 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify connections can be detected: #protocol > Verify connections can be detected: L4_PROTOCOL_TCP PASSED NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: tcp-connection-target STANDARD_OUT 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify listen port availability matches feature flag: tcp-connection-target 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: tcp-connection-target PASSED NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: nginx-connection-target STANDARD_OUT 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify listen port availability matches feature flag: nginx-connection-target 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: nginx-connection-target PASSED NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: no-connection-source STANDARD_OUT 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify listen port availability matches feature flag: no-connection-source 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: no-connection-source PASSED NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: tcp-connection-source STANDARD_OUT 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify listen port availability matches feature flag: tcp-connection-source 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: tcp-connection-source PASSED NetworkFlowTest > Verify connections with short consistent intervals between 2 deployments STANDARD_OUT 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify connections with short consistent intervals between 2 deployments 05:41:15 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between short-consistent-source and nginx-connection-target 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:16 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:16 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:17 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:17 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:18 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:18 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:19 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:19 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:20 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:20 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:21 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:21 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:22 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:22 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:24 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:24 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:25 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:25 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:26 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:26 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:27 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:27 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:28 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:28 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:29 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:29 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:30 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:30 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:31 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:31 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:32 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:32 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:33 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:33 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:34 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:34 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:35 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:35 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:36 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:36 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:37 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:37 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:38 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:38 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:39 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:39 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:42 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:42 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:44 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:44 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> target 0639a7c0-33c7-4cf6-8a04-a02087ed1737 in graph after 30.265s 05:41:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:47 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:47 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:47 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:47 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:47 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:49 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:49 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:49 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:49 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:49 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:50 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:50 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:50 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:50 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:50 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:51 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:51 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:51 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:51 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:51 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:52 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:52 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:52 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:52 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:52 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:53 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:53 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:53 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:53 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:53 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:54 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:54 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:54 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:54 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:54 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:55 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:55 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:55 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:55 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:55 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:56 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:56 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:56 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:56 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:56 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:57 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:57 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:57 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:57 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:57 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:58 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:58 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:58 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:58 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:58 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:41:59 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:59 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:59 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:41:59 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:41:59 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:00 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:00 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:00 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:00 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:00 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:01 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:01 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:01 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:01 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:01 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:02 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:02 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:02 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:02 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:02 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:03 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:03 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:03 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:03 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:03 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:04 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:04 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:04 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:04 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:04 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:05 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:05 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:05 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:05 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:05 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:06 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:06 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:06 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:06 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:06 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:07 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:07 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:07 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:07 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:07 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:08 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:08 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:08 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:08 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:08 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:10 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:10 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:10 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:10 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:10 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:11 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:11 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:11 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:11 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:11 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:12 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:12 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:12 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:12 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:12 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:13 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:13 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:13 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:13 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:13 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:14 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:14 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:14 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:14 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:14 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889260.146883000 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 9f02febb-d2da-47f3-b7d0-7c5ad4163da3, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 3 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889290.151902000 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Found updated edge in graph after 29.312s 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | The updated edge is 30 seconds later 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify connections with short consistent intervals between 2 deployments PASSED NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "" and scoped to "Orchestrator Component:false" contains non-orchestrator deployments only STANDARD_OUT 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify network graph when filtered on "" and scoped to "Orchestrator Component:false" contains non-orchestrator deployments only 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "" and scoped to "Orchestrator Component:false" contains non-orchestrator deployments only PASSED NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Orchestrator Component:false" and scoped to "" contains non-orchestrator deployments and connected orchestrator deployments STANDARD_OUT 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify network graph when filtered on "Orchestrator Component:false" and scoped to "" contains non-orchestrator deployments and connected orchestrator deployments 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Orchestrator Component:false" and scoped to "" contains non-orchestrator deployments and connected orchestrator deployments PASSED NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Orchestrator Component:true" and scoped to "Orchestrator Component:false" contains no deployments STANDARD_OUT 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify network graph when filtered on "Orchestrator Component:true" and scoped to "Orchestrator Component:false" contains no deployments 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Orchestrator Component:true" and scoped to "Orchestrator Component:false" contains no deployments PASSED NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Orchestrator Component:false" and scoped to "Orchestrator Component:true" contains no deployments STANDARD_OUT 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify network graph when filtered on "Orchestrator Component:false" and scoped to "Orchestrator Component:true" contains no deployments 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Orchestrator Component:false" and scoped to "Orchestrator Component:true" contains no deployments PASSED NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Namespace:stackrox" and scoped to "Orchestrator Component:false" contains stackrox deployments only STANDARD_OUT 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify network graph when filtered on "Namespace:stackrox" and scoped to "Orchestrator Component:false" contains stackrox deployments only 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Namespace:stackrox" and scoped to "Orchestrator Component:false" contains stackrox deployments only PASSED NetworkFlowTest > Verify network flows with graph filtering STANDARD_OUT 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify network flows with graph filtering 05:42:15 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between tcp-connection-source and tcp-connection-target 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0762f344-8c28-4835-b83d-d3bbd019f499, targetId 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 0762f344-8c28-4835-b83d-d3bbd019f499 -> edge target key: 8 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889335.920004011 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source 0762f344-8c28-4835-b83d-d3bbd019f499 -> target 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 in graph after 0.043s 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0762f344-8c28-4835-b83d-d3bbd019f499, targetId 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 0762f344-8c28-4835-b83d-d3bbd019f499 -> edge target key: 8 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 05:42:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889335.963386483 05:42:17 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 0762f344-8c28-4835-b83d-d3bbd019f499, targetId 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 05:42:17 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:17 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 0762f344-8c28-4835-b83d-d3bbd019f499 -> edge target key: 8 05:42:17 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 05:42:17 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889337.8909558 05:42:17 | INFO | NetworkFlowTest | NetworkFlowTest | Found updated edge in graph after 1.088s 05:42:17 | INFO | NetworkFlowTest | NetworkFlowTest | The updated edge is 1 seconds later 05:42:17 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify network flows with graph filtering PASSED NetworkFlowTest > Verify connections to external sources SKIPPED NetworkFlowTest > Verify connections from external sources SKIPPED NetworkFlowTest > Verify intra-cluster connection via internal IP STANDARD_OUT 05:42:17 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify intra-cluster connection via internal IP 05:42:17 | INFO | NetworkFlowTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:42:17 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify intra-cluster connection via internal IP SKIPPED NetworkFlowTest > Verify no connections between 2 deployments STANDARD_OUT 05:42:17 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify no connections between 2 deployments 05:42:17 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for NO edge between no-connection-source and nginx-connection-target 05:42:17 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:17 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:18 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:18 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:19 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:19 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:20 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:20 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:21 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:21 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:22 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:22 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:23 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:23 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:24 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:24 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:25 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:25 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:26 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:26 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:27 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:27 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:28 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:28 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:29 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:29 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:30 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:30 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:31 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:31 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:32 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:32 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:33 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:33 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:34 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:34 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:35 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:35 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:36 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:36 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:37 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:37 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:38 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:38 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:42 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:42 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:44 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:44 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:46 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:46 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:47 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:47 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId cf76bf51-8d19-4f39-ba73-1cb8b65718d1, targetId 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:48 | WARN | NetworkFlowTest | NetworkGraphUtil | SR did not detect the edge in Network Flow graph 05:42:48 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify no connections between 2 deployments PASSED NetworkFlowTest > Verify connections between two deployments on 2 separate ports shows both edges in the graph STANDARD_OUT 05:42:48 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify connections between two deployments on 2 separate ports shows both edges in the graph 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 32cb2fb3-f821-4a72-946b-d1524000f2e3, targetId 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 32cb2fb3-f821-4a72-946b-d1524000f2e3 -> edge target key: 8 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 8080 L4_PROTOCOL_TCP 1761889368.436060082 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889368.436176975 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source 32cb2fb3-f821-4a72-946b-d1524000f2e3 -> target 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 in graph after 0.041s 05:42:48 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify connections between two deployments on 2 separate ports shows both edges in the graph PASSED NetworkFlowTest > Verify cluster updates can block flow connections from showing SKIPPED NetworkFlowTest > Verify edge timestamps are never in the future, or before start of flow tests STANDARD_OUT 05:42:48 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify edge timestamps are never in the future, or before start of flow tests 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId null 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 12 source node(s) 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 36d9e785-be0e-4ba6-af46-454fd9a7c951 -> edge target key: 11 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: afa12424-bde3-4313-b810-bb463cbe8f90 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889320.506752000 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 9f02febb-d2da-47f3-b7d0-7c5ad4163da3 -> edge target key: 0 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889320.156890000 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 0e4a5286-498c-45bb-b6bf-9ef51ab3dcaa -> edge target key: 0 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 0639a7c0-33c7-4cf6-8a04-a02087ed1737 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889230.202892000 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id eb640c8d-0145-4d01-b258-c715ac349083 -> edge target key: 6 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 7f41cbb1-0c56-460d-b7bb-e22c1818c76b 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 8080 L4_PROTOCOL_UDP 1761889368.495921776 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 32cb2fb3-f821-4a72-946b-d1524000f2e3 -> edge target key: 5 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889368.495921206 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 8080 L4_PROTOCOL_TCP 1761889368.495922656 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id ccf586d1-3a5e-4b69-9ddc-18a9f8903f2c -> edge target key: 5 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889368.495922296 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 0762f344-8c28-4835-b83d-d3bbd019f499 -> edge target key: 5 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 2cd5a794-01b3-4e2b-a7a4-c3cde55c0451 05:42:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1761889368.495923666 05:42:48 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify edge timestamps are never in the future, or before start of flow tests PASSED NetworkFlowTest > Verify generated network policies STANDARD_OUT 05:42:48 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify generated network policies 05:42:48 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: no-connection-source 05:42:49 | INFO | NetworkFlowTest | Services | SR does not detect the deployment no-connection-source yet: io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id 'cf76bf51-8d19-4f39-ba73-1cb8b65718d1' does not exist: not found 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | Verifying graph edges of tcp-connection-target 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | tcp-connection-target has incoming connections 05:42:49 | DEBUG | NetworkFlowTest | NetworkFlowTest | sourceDeploymentsFromGraph: [tcp-connection-source-qa2, tcp-connection-source, two-ports-connect-source] 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | Verifying graph edges of udp-connection-target 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | udp-connection-target has incoming connections 05:42:49 | DEBUG | NetworkFlowTest | NetworkFlowTest | sourceDeploymentsFromGraph: [udp-connection-source] 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | short-consistent-source has no incoming connections - ensure ingress spec is empty 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | two-ports-connect-source has no incoming connections - ensure ingress spec is empty 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | tcp-connection-source-qa2 has no incoming connections - ensure ingress spec is empty 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | udp-connection-source has no incoming connections - ensure ingress spec is empty 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | nginx-connection-target has LB/External incoming traffic - ensure All Ingress allowed 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | udp-connection-target has incoming connections - ensure podSelectors/namespaceSelectors match sources from graph 05:42:49 | DEBUG | NetworkFlowTest | NetworkFlowTest | sourceDeploymentsFromNetworkPolicy: [udp-connection-source] 05:42:49 | DEBUG | NetworkFlowTest | NetworkFlowTest | sourceDeploymentsFromGraph: [udp-connection-source] 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | single-connection-source has no incoming connections - ensure ingress spec is empty 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | external-destination-source has no incoming connections - ensure ingress spec is empty 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | tcp-connection-source has no incoming connections - ensure ingress spec is empty 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | tcp-connection-target has incoming connections - ensure podSelectors/namespaceSelectors match sources from graph 05:42:49 | DEBUG | NetworkFlowTest | NetworkFlowTest | sourceDeploymentsFromNetworkPolicy: [two-ports-connect-source, tcp-connection-source-qa2, tcp-connection-source] 05:42:49 | DEBUG | NetworkFlowTest | NetworkFlowTest | sourceDeploymentsFromGraph: [tcp-connection-source-qa2, tcp-connection-source, two-ports-connect-source] 05:42:49 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify generated network policies PASSED NetworkFlowTest > Apply a generated network policy and verify connection states SKIPPED NetworkFlowTest STANDARD_OUT 05:42:49 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: no-connection-source 05:42:49 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: short-consistent-source 05:42:49 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: single-connection-source 05:42:49 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: udp-connection-source 05:42:49 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: tcp-connection-source 05:42:49 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: two-ports-connect-source 05:42:49 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: external-destination-source 05:42:49 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: tcp-connection-source-qa2 05:42:49 | DEBUG | NetworkFlowTest | Kubernetes | udp-connection-target: Service deleting... 05:42:50 | DEBUG | NetworkFlowTest | Kubernetes | udp-connection-target: Service deleted 05:42:50 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: udp-connection-target 05:42:50 | DEBUG | NetworkFlowTest | Kubernetes | tcp-connection-target: Service deleting... 05:42:50 | DEBUG | NetworkFlowTest | Kubernetes | tcp-connection-target: Service deleted 05:42:50 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: tcp-connection-target 05:42:50 | DEBUG | NetworkFlowTest | Kubernetes | nginx-connection-target: Service deleting... 05:42:50 | DEBUG | NetworkFlowTest | Kubernetes | nginx-connection-target: Service deleted 05:42:50 | DEBUG | NetworkFlowTest | OpenShift | Deleting a route: nginx-connection-target 05:42:50 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: nginx-connection-target 05:42:50 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service udp-connection-target to be deleted 05:42:50 | DEBUG | NetworkFlowTest | Kubernetes | udp-connection-target: service removed. 05:42:50 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service tcp-connection-target to be deleted 05:42:50 | DEBUG | NetworkFlowTest | Kubernetes | tcp-connection-target: service removed. 05:42:50 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service nginx-connection-target to be deleted 05:42:55 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service nginx-connection-target to be deleted 05:43:00 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service nginx-connection-target to be deleted 05:43:05 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service nginx-connection-target to be deleted 05:43:10 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service nginx-connection-target to be deleted 05:43:10 | DEBUG | NetworkFlowTest | Kubernetes | nginx-connection-target: service removed. 05:43:10 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for namespace qa2 to be deleted 05:43:10 | DEBUG | NetworkFlowTest | Kubernetes | Retrying in 3... 05:43:13 | DEBUG | NetworkFlowTest | Kubernetes | Retrying in 3... 05:43:16 | DEBUG | NetworkFlowTest | Kubernetes | Retrying in 3... 05:43:19 | DEBUG | NetworkFlowTest | Kubernetes | Retrying in 3... 05:43:22 | DEBUG | NetworkFlowTest | Kubernetes | Retrying in 3... 05:43:25 | DEBUG | NetworkFlowTest | Kubernetes | Retrying in 3... 05:43:28 | DEBUG | NetworkFlowTest | Kubernetes | Retrying in 3... 05:43:31 | DEBUG | NetworkFlowTest | Kubernetes | Retrying in 3... 05:43:34 | DEBUG | NetworkFlowTest | Kubernetes | Retrying in 3... 05:43:37 | DEBUG | NetworkFlowTest | Kubernetes | K8s found that namespace qa2 was deleted 05:43:37 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for namespace qa2 to be deleted 05:43:37 | DEBUG | NetworkFlowTest | Kubernetes | K8s found that namespace qa2 was deleted 05:43:42 | DEBUG | NetworkFlowTest | Kubernetes | collector-config: ConfigMap removed. 05:43:42 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testsuite 05:43:42 | INFO | NetworkFlowTest | NetworkFlowTest | Checking if cluster is healthy after test 05:43:42 | DEBUG | NetworkFlowTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries NetworkSimulator STANDARD_OUT 05:43:42 | INFO | NetworkSimulator | NetworkSimulator | Starting testsuite 05:43:42 | DEBUG | NetworkSimulator | OpenShift | Namespace qa already exists 05:43:42 | DEBUG | NetworkSimulator | Kubernetes | Told the orchestrator to createOrReplace web 05:43:42 | DEBUG | NetworkSimulator | OpenShift | Namespace qa already exists 05:43:42 | DEBUG | NetworkSimulator | Kubernetes | Told the orchestrator to createOrReplace alt-web 05:43:42 | DEBUG | NetworkSimulator | OpenShift | Namespace qa already exists 05:43:42 | DEBUG | NetworkSimulator | Kubernetes | Told the orchestrator to createOrReplace client 05:43:42 | DEBUG | NetworkSimulator | OpenShift | Namespace qa already exists 05:43:42 | DEBUG | NetworkSimulator | Kubernetes | Told the orchestrator to createOrReplace alt-client 05:43:42 | DEBUG | NetworkSimulator | Kubernetes | Waiting for web to start 05:43:42 | DEBUG | NetworkSimulator | Kubernetes | Status of web's pods: 05:43:42 | DEBUG | NetworkSimulator | Kubernetes | - web-7cb99696b6-7z84g Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:43:42 | DEBUG | NetworkSimulator | Kubernetes | 0/1 are in the ready state for web 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | Waiting for web to start 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | Status of web's pods: 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | - web-7cb99696b6-7z84g Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:43:43Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | All 1 replicas found in ready state for web 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | Took 3 seconds for k8s deployment web 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | Updating deployment web with 1 pods 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | Waiting for alt-web to start 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | Status of alt-web's pods: 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | - alt-web-845549b468-hxl58 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:43:43Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | All 1 replicas found in ready state for alt-web 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | Took 0 seconds for k8s deployment alt-web 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | Updating deployment alt-web with 1 pods 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | Waiting for client to start 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | Status of client's pods: 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | - client-5574847695-sssps Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:43:43Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | All 1 replicas found in ready state for client 05:43:45 | DEBUG | NetworkSimulator | Kubernetes | Took 0 seconds for k8s deployment client 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | Updating deployment client with 1 pods 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | Waiting for alt-client to start 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | Status of alt-client's pods: 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | - alt-client-74b4cc4757-fl6gm Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:43:43Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | All 1 replicas found in ready state for alt-client 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | Took 0 seconds for k8s deployment alt-client 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | Updating deployment alt-client with 1 pods 05:43:46 | INFO | NetworkSimulator | Services | SR found deployment web within 0s 05:43:46 | INFO | NetworkSimulator | Services | SR found deployment alt-web within 0s 05:43:46 | INFO | NetworkSimulator | Services | SR found deployment client within 0s 05:43:46 | INFO | NetworkSimulator | Services | SR found deployment alt-client within 0s NetworkSimulator > Verify NetworkPolicy Simulator replace existing network policy > Verify NetworkPolicy Simulator replace existing network policy [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] STANDARD_OUT 05:43:46 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator replace existing network policy [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | deny-all-namespace-ingress: NetworkPolicy created: 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-namespace-ingress namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress 05:43:46 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | deny-all-namespace-ingress: NetworkPolicy removed. 05:43:46 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '4c98e147-dbba-4450-851a-737e5a9f2246' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_0(NetworkSimulator.groovy:118) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:46 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator replace existing network policy > Verify NetworkPolicy Simulator replace existing network policy [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] PASSED NetworkSimulator > Verify NetworkPolicy Simulator replace existing network policy > Verify NetworkPolicy Simulator replace existing network policy [scope: , orchestratorDepsShouldExist: true, #1] STANDARD_OUT 05:43:46 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator replace existing network policy [scope: , orchestratorDepsShouldExist: true, #1] 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | deny-all-namespace-ingress: NetworkPolicy created: 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-namespace-ingress namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress 05:43:46 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | deny-all-namespace-ingress: NetworkPolicy removed. 05:43:46 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id 'd6f4bf86-0a69-4768-96bb-82f733d56a21' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_0(NetworkSimulator.groovy:118) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:46 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator replace existing network policy > Verify NetworkPolicy Simulator replace existing network policy [scope: , orchestratorDepsShouldExist: true, #1] PASSED NetworkSimulator > Verify NetworkPolicy Simulator add to an existing network policy > Verify NetworkPolicy Simulator add to an existing network policy [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] STANDARD_OUT 05:43:46 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator add to an existing network policy [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:43:46 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 20231452-e84e-4a63-a2ac-53ed01493ff5 -> edge target key: 11 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 31a01872-ed06-4a57-89f8-aeef141126ef -> edge target key: 11 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4fffad70-170f-42fe-8484-340c19e7e648 -> edge target key: 11 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 70c90956-ec6f-4762-846e-5d4d6ac0e649 -> edge target key: 11 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7937882b-93f5-4c7f-83a9-486a679b86b6 -> edge target key: 11 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 -> edge target key: 11 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ade3bd15-7d09-48a5-b0a2-3e217e9c33c1 -> edge target key: 11 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b9d55f70-553e-426c-a058-371876a5e3a7 -> edge target key: 11 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf80b90a-4e2d-4b21-96e0-01d681e94135 -> edge target key: 11 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c735c7e3-c546-435d-b3ca-8fccba5334be -> edge target key: 11 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cffb108c-af45-46a9-ba90-fe6fa17e8804 -> edge target key: 11 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f1bf399c-f5ee-4971-af26-73ef082f7577 -> edge target key: 11 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id feeec67e-3c88-467e-90fe-485785f6b683 -> edge target key: 11 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 8321d3c1-7836-46e6-baa2-641e440a06e5, targetId null 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 8321d3c1-7836-46e6-baa2-641e440a06e5, targetId null 05:43:46 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:43:46 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '2dbabb3e-4e8a-4f23-ba97-d0c38c9ac344' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_1(NetworkSimulator.groovy:192) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:46 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator add to an existing network policy > Verify NetworkPolicy Simulator add to an existing network policy [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] PASSED NetworkSimulator > Verify NetworkPolicy Simulator add to an existing network policy > Verify NetworkPolicy Simulator add to an existing network policy [scope: , orchestratorDepsShouldExist: true, #1] STANDARD_OUT 05:43:46 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator add to an existing network policy [scope: , orchestratorDepsShouldExist: true, #1] 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:43:46 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:43:46 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 000de9eb-d41a-4180-b264-756bf0003f70 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 02248886-e801-44b6-9e92-7bac24d99732 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05b30a60-9240-45e8-bf2e-44d9cd1902e3 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 067358fc-054c-4d85-8dd9-b9a17377273e -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0b7f6534-a038-42f2-aee3-462b0ea1f8ea -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cb9b442-d073-4c2b-8bf0-bbe08ca0c623 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cd29685-34cc-49f4-b410-bc23616d3896 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0eaca895-b9ec-4016-96d5-ceb5eefa3bf1 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 11d4363a-beab-497a-b86b-4006d711ea65 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 13a2dca4-c0e8-4b0b-a44c-212a3d628874 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 16788bfd-a1b7-4fea-af32-8dd73a624f9d -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 17f759cf-0607-473d-9f93-ceb806aebcf6 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1a06bba6-3027-4fb4-94f8-2106b4773a3f -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1cd7f647-1007-4d88-9fec-ee6ae13ff751 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1e21e3ca-64ea-49d9-8ba3-14b799e9e093 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 20231452-e84e-4a63-a2ac-53ed01493ff5 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 280f9886-262a-471a-86ed-d6804386e2eb -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2ac1ce30-50e5-4171-b50e-400f7ccdaf46 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2d699a4f-2005-4993-8c9a-35b7aae971ec -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2fdeb41a-f418-4773-845c-61376973e9e0 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3193d3d5-4d3a-4c8e-9a8e-e3205fa4769b -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 31a01872-ed06-4a57-89f8-aeef141126ef -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 31ace024-0e67-4721-a3ac-9d4d10995736 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 344ae9ac-6c30-4c0f-83e4-5ffd22eb487e -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 35d0f52d-5b6c-448a-925e-add2805a43d1 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 36ed1194-e260-4d9f-93d5-f7a7189582fb -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 38c1298b-594c-4b0b-825a-196e1e42e566 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3a18bf67-f1a4-45be-ab5f-8a42a3630e53 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3f006a91-705e-4e64-97b3-225a0428f805 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3fc85660-95c3-4e56-9ba1-a6bf4f0c2fe7 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 49d52088-d5c3-4ca6-abbf-3c556d159cc2 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4dc1f20d-06ad-46c3-b715-7dd127e464e5 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4e28dc8a-5e1e-4749-bdf2-c10dec3ae844 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4ef37528-d774-444f-9bb8-814bffa0b6ef -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4fffad70-170f-42fe-8484-340c19e7e648 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 525af6f9-c7e5-4227-877b-55e8b6de55cf -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 54b8b9af-981f-4afd-b8ea-35a0b8bb3d6a -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 56db824f-429a-4472-8f98-44c317ba7a8c -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 58701cbb-bdfb-4651-8841-cce0520bf13b -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 59181e74-454f-4db0-a203-e76001d024e7 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a2564f4-89d3-4cbd-a219-a72c5c67dd44 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a64de51-f8f2-4e54-9b38-3e4f12c618b4 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a69ae46-7728-45fb-9829-fcf1a3cc150a -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a73488a-2940-4ce8-8c0c-c2f384b175e5 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5b3af827-c357-443c-baa3-da881673cfab -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5ce74e99-4503-406b-a730-359bb7403799 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 64e5ebd3-7cac-4bfc-b62f-91c0637f5194 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 66f49a2c-6ff7-4e81-ac2e-691f64b2fca0 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 67a3c4c6-193e-4dcf-a3e6-05a62f5c57dc -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6805c8f2-7b97-4cce-a9e4-1878f456e667 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6c422df9-43eb-475f-a7cf-c013d10c4a9e -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 70c90956-ec6f-4762-846e-5d4d6ac0e649 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 735b4eb7-5c1b-4cc8-8b82-3bef7ebc6a1a -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 73991272-2120-41b7-b3a0-ce0e046f90cc -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 75de0a0f-22ae-47a4-8ea8-4ac3f399ec29 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7860996d-12af-4a11-94cc-38a3b594f132 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7937882b-93f5-4c7f-83a9-486a679b86b6 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7bc5eeff-f3bc-47e7-97d0-49b039ee4533 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7bcf11fc-23b7-46c6-9251-abf3fe7a0f18 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7c77864e-eb41-4566-addd-7c0ab1f304ba -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7c92fbcf-4fcc-4779-a803-f3e8fac90609 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7e34ec9d-ebcf-4f3d-a366-8e7cd5c0c059 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 800b2d7f-5e37-462d-9765-96742feac3e2 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 86eef77a-86f8-4880-be4e-59c5e1c72090 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8e19871f-5ad6-4fa3-8057-0949bb6aac13 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8ed0ef99-949c-4611-b355-9f26442254ec -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9170fc31-968b-45ee-a990-b3cc262f4f24 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 938e776b-be1a-4197-ad00-59c8dd47b9eb -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9570b4b5-e84a-45fa-9fe1-d28d5a9efe86 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9612ff09-4288-401a-847f-a1013448c21a -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9784f7ae-c77d-48f5-aeed-3ed6df541d45 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9e3a5619-a524-4227-856a-a9dac38b7f83 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9e9d5412-1b4b-4c53-a030-e5d71ff758c7 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9f499770-4ddc-416f-a886-349e93464810 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1039493-3cad-4fe2-80d3-2f9d72652592 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a16fe598-3422-4d53-aebe-3877a26f843c -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1815365-6391-4c21-8408-5f86be4e300c -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a2076b4d-b027-42a3-b6b8-55b1183a9772 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a2432711-7f3b-4812-897d-29b38dc2fabc -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a68991f5-7608-4cfd-b8bc-77c3636aaa4d -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6a0308f-a62f-4fc9-b5d5-a1bb2139ca68 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a9cdb2ec-ce9c-4506-bdc6-7541c292ac10 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ab507529-a40d-4b0f-979d-dd33f069d5c8 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ac572b10-b3fa-4bf7-b028-a5501566252f -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id adacccc7-dd13-4a0e-a8d2-8aaf97f6e585 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ade3bd15-7d09-48a5-b0a2-3e217e9c33c1 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ae20d5db-387c-490f-a9c7-60ffb5e59738 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id aec595a5-1789-470a-b3d6-11a2deb7bbde -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b2be4f60-e5b8-4b7f-9a8a-e0ec7ec15666 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b2cd66cf-9d85-4e80-9ebd-f63e52cf5b2b -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b37dd5b7-745d-49b6-b83b-78627f2e2653 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b80c119e-08ce-4ec8-838c-312ae14dd036 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b8cc0ce3-321c-47fd-8bdd-56adb0f13c78 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b9d55f70-553e-426c-a058-371876a5e3a7 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bab1586a-241a-4e28-be27-f7b3392f4e59 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bab44e8c-14f9-4519-9f21-993d9a19d6fd -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bacf8852-40be-4efa-a880-59193a23a06c -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bdb0495f-8f34-4e3a-8705-957f1b5e3ae9 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id be9dd95f-aaa6-471b-aee1-326bcf2059aa -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf80b90a-4e2d-4b21-96e0-01d681e94135 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c2d3fa70-801d-4e92-8414-a9f45d430ae0 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c33067f2-8cb6-4bfb-9599-e921f1d86f3a -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c45d351c-1713-4a3e-9689-2560c6ea4cd5 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c735c7e3-c546-435d-b3ca-8fccba5334be -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ca31d162-4248-48db-8102-04db891b8ff5 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cb119cc7-8330-4b60-8aad-22c0a8150317 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cb411b95-af33-49aa-ba21-728d2cf59ecc -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cb43634e-27ff-450a-b1a6-da438c2c031e -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cba2050d-abe2-4f85-828c-a39c569f7dfa -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cffb108c-af45-46a9-ba90-fe6fa17e8804 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d03f36d8-5202-4e3a-8794-bfd6fdfa6d9e -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d0e21af2-a5ad-4e31-866b-1d04ce256169 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d8fba165-ee5d-4c29-bf2a-c8455d51fd75 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id dd290874-42c0-4350-a8d4-4455c07c7805 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id dd8d792d-2213-45f8-997f-fa3e0489cbdf -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id dd9d02fd-0793-4334-99a7-85dc4aba2266 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id de8d49ed-07d7-4760-b523-d33bb0e3cfbd -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e4f3c5f1-6445-4448-a39a-93ea723b9e40 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e552e877-a094-42cf-aea0-657290923e22 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e752d030-ff34-4380-b07c-2c884170ed4a -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e7ac45a4-a7b3-401f-9cc6-bc457d321b9c -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ea140b9e-480a-490c-abdf-a604baafd1bf -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ef747d77-2cf7-412a-aab8-c7d82f2b0636 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f02a98fc-9cf6-4dc0-87d1-ac1978d16808 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f1bf399c-f5ee-4971-af26-73ef082f7577 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f28d5b06-a992-4272-b41e-dec94dfe5a4a -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f5539f9e-8e4a-46bf-bb4b-d1fa0f80df7e -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f5bb01c6-16c3-4c64-9539-cccdf55094fe -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f6c9d68d-3043-4368-896c-22495e921cfd -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f74c9f5d-a88c-4fc1-8dcd-9fb563ef81bb -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f950aae1-1b33-4d78-9473-39e5041e358b -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id feeec67e-3c88-467e-90fe-485785f6b683 -> edge target key: 98 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 8321d3c1-7836-46e6-baa2-641e440a06e5, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 8321d3c1-7836-46e6-baa2-641e440a06e5, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:43:47 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id 'b3098b42-a7e8-45df-968b-919e759d7a70' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_1(NetworkSimulator.groovy:192) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:47 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator add to an existing network policy > Verify NetworkPolicy Simulator add to an existing network policy [scope: , orchestratorDepsShouldExist: true, #1] PASSED NetworkSimulator > Verify NetworkPolicy Simulator with query - multiple policy simulation > Verify NetworkPolicy Simulator with query - multiple policy simulation [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] STANDARD_OUT 05:43:47 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator with query - multiple policy simulation [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:43:47 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 2 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8321d3c1-7836-46e6-baa2-641e440a06e5 -> edge target key: 1 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 2 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 8321d3c1-7836-46e6-baa2-641e440a06e5, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8321d3c1-7836-46e6-baa2-641e440a06e5 -> edge target key: 1 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId afa12424-bde3-4313-b810-bb463cbe8f90, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Found no nodes matching sourceId afa12424-bde3-4313-b810-bb463cbe8f90 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:43:47 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '8de4928f-b1b5-416a-80e5-6933409a1eac' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_2(NetworkSimulator.groovy:284) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:47 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator with query - multiple policy simulation > Verify NetworkPolicy Simulator with query - multiple policy simulation [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] PASSED NetworkSimulator > Verify NetworkPolicy Simulator with query - multiple policy simulation > Verify NetworkPolicy Simulator with query - multiple policy simulation [scope: , orchestratorDepsShouldExist: false, #1] STANDARD_OUT 05:43:47 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator with query - multiple policy simulation [scope: , orchestratorDepsShouldExist: false, #1] 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:43:47 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 2 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8321d3c1-7836-46e6-baa2-641e440a06e5 -> edge target key: 1 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 2 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 8321d3c1-7836-46e6-baa2-641e440a06e5, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8321d3c1-7836-46e6-baa2-641e440a06e5 -> edge target key: 1 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId afa12424-bde3-4313-b810-bb463cbe8f90, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Found no nodes matching sourceId afa12424-bde3-4313-b810-bb463cbe8f90 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:43:47 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '0369ee41-af06-49e5-907c-3bc6c3b4cfae' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_2(NetworkSimulator.groovy:284) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:47 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator with query - multiple policy simulation > Verify NetworkPolicy Simulator with query - multiple policy simulation [scope: , orchestratorDepsShouldExist: false, #1] PASSED NetworkSimulator > Verify NetworkPolicy Simulator with query - single policy simulation > Verify NetworkPolicy Simulator with query - single policy simulation [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] STANDARD_OUT 05:43:47 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator with query - single policy simulation [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:43:47 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 14 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 20231452-e84e-4a63-a2ac-53ed01493ff5 -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 31a01872-ed06-4a57-89f8-aeef141126ef -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4fffad70-170f-42fe-8484-340c19e7e648 -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 70c90956-ec6f-4762-846e-5d4d6ac0e649 -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7937882b-93f5-4c7f-83a9-486a679b86b6 -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ade3bd15-7d09-48a5-b0a2-3e217e9c33c1 -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b9d55f70-553e-426c-a058-371876a5e3a7 -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf80b90a-4e2d-4b21-96e0-01d681e94135 -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c735c7e3-c546-435d-b3ca-8fccba5334be -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cffb108c-af45-46a9-ba90-fe6fa17e8804 -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f1bf399c-f5ee-4971-af26-73ef082f7577 -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id feeec67e-3c88-467e-90fe-485785f6b683 -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 -> edge target key: 7 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:43:47 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id 'ddbb9838-28d9-434c-bfcf-ab44d85d2e80' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_3(NetworkSimulator.groovy:363) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:47 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator with query - single policy simulation > Verify NetworkPolicy Simulator with query - single policy simulation [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] PASSED NetworkSimulator > Verify NetworkPolicy Simulator with query - single policy simulation > Verify NetworkPolicy Simulator with query - single policy simulation [scope: , orchestratorDepsShouldExist: true, #1] STANDARD_OUT 05:43:47 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator with query - single policy simulation [scope: , orchestratorDepsShouldExist: true, #1] 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:43:47 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 134 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 000de9eb-d41a-4180-b264-756bf0003f70 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 02248886-e801-44b6-9e92-7bac24d99732 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05b30a60-9240-45e8-bf2e-44d9cd1902e3 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 067358fc-054c-4d85-8dd9-b9a17377273e -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0b7f6534-a038-42f2-aee3-462b0ea1f8ea -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cb9b442-d073-4c2b-8bf0-bbe08ca0c623 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cd29685-34cc-49f4-b410-bc23616d3896 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0eaca895-b9ec-4016-96d5-ceb5eefa3bf1 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 11d4363a-beab-497a-b86b-4006d711ea65 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 13a2dca4-c0e8-4b0b-a44c-212a3d628874 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 16788bfd-a1b7-4fea-af32-8dd73a624f9d -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 17f759cf-0607-473d-9f93-ceb806aebcf6 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1a06bba6-3027-4fb4-94f8-2106b4773a3f -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1cd7f647-1007-4d88-9fec-ee6ae13ff751 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1e21e3ca-64ea-49d9-8ba3-14b799e9e093 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 20231452-e84e-4a63-a2ac-53ed01493ff5 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 280f9886-262a-471a-86ed-d6804386e2eb -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2ac1ce30-50e5-4171-b50e-400f7ccdaf46 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2d699a4f-2005-4993-8c9a-35b7aae971ec -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2fdeb41a-f418-4773-845c-61376973e9e0 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3193d3d5-4d3a-4c8e-9a8e-e3205fa4769b -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 31a01872-ed06-4a57-89f8-aeef141126ef -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 31ace024-0e67-4721-a3ac-9d4d10995736 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 344ae9ac-6c30-4c0f-83e4-5ffd22eb487e -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 35d0f52d-5b6c-448a-925e-add2805a43d1 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 36ed1194-e260-4d9f-93d5-f7a7189582fb -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 38c1298b-594c-4b0b-825a-196e1e42e566 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3a18bf67-f1a4-45be-ab5f-8a42a3630e53 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3f006a91-705e-4e64-97b3-225a0428f805 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3fc85660-95c3-4e56-9ba1-a6bf4f0c2fe7 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 49d52088-d5c3-4ca6-abbf-3c556d159cc2 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4dc1f20d-06ad-46c3-b715-7dd127e464e5 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4e28dc8a-5e1e-4749-bdf2-c10dec3ae844 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4ef37528-d774-444f-9bb8-814bffa0b6ef -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4fffad70-170f-42fe-8484-340c19e7e648 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 525af6f9-c7e5-4227-877b-55e8b6de55cf -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 54b8b9af-981f-4afd-b8ea-35a0b8bb3d6a -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 56db824f-429a-4472-8f98-44c317ba7a8c -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 58701cbb-bdfb-4651-8841-cce0520bf13b -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 59181e74-454f-4db0-a203-e76001d024e7 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a2564f4-89d3-4cbd-a219-a72c5c67dd44 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a64de51-f8f2-4e54-9b38-3e4f12c618b4 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a69ae46-7728-45fb-9829-fcf1a3cc150a -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a73488a-2940-4ce8-8c0c-c2f384b175e5 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5b3af827-c357-443c-baa3-da881673cfab -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5ce74e99-4503-406b-a730-359bb7403799 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 64e5ebd3-7cac-4bfc-b62f-91c0637f5194 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 66f49a2c-6ff7-4e81-ac2e-691f64b2fca0 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 67a3c4c6-193e-4dcf-a3e6-05a62f5c57dc -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6805c8f2-7b97-4cce-a9e4-1878f456e667 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6c422df9-43eb-475f-a7cf-c013d10c4a9e -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 70c90956-ec6f-4762-846e-5d4d6ac0e649 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 735b4eb7-5c1b-4cc8-8b82-3bef7ebc6a1a -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 73991272-2120-41b7-b3a0-ce0e046f90cc -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 75de0a0f-22ae-47a4-8ea8-4ac3f399ec29 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7860996d-12af-4a11-94cc-38a3b594f132 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7937882b-93f5-4c7f-83a9-486a679b86b6 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7bc5eeff-f3bc-47e7-97d0-49b039ee4533 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7bcf11fc-23b7-46c6-9251-abf3fe7a0f18 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7c77864e-eb41-4566-addd-7c0ab1f304ba -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7c92fbcf-4fcc-4779-a803-f3e8fac90609 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7e34ec9d-ebcf-4f3d-a366-8e7cd5c0c059 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 800b2d7f-5e37-462d-9765-96742feac3e2 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 86eef77a-86f8-4880-be4e-59c5e1c72090 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8e19871f-5ad6-4fa3-8057-0949bb6aac13 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8ed0ef99-949c-4611-b355-9f26442254ec -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9170fc31-968b-45ee-a990-b3cc262f4f24 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 938e776b-be1a-4197-ad00-59c8dd47b9eb -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9570b4b5-e84a-45fa-9fe1-d28d5a9efe86 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9612ff09-4288-401a-847f-a1013448c21a -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9784f7ae-c77d-48f5-aeed-3ed6df541d45 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9e3a5619-a524-4227-856a-a9dac38b7f83 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9e9d5412-1b4b-4c53-a030-e5d71ff758c7 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9f499770-4ddc-416f-a886-349e93464810 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1039493-3cad-4fe2-80d3-2f9d72652592 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a16fe598-3422-4d53-aebe-3877a26f843c -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1815365-6391-4c21-8408-5f86be4e300c -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a2076b4d-b027-42a3-b6b8-55b1183a9772 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a2432711-7f3b-4812-897d-29b38dc2fabc -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a68991f5-7608-4cfd-b8bc-77c3636aaa4d -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6a0308f-a62f-4fc9-b5d5-a1bb2139ca68 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a9cdb2ec-ce9c-4506-bdc6-7541c292ac10 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ab507529-a40d-4b0f-979d-dd33f069d5c8 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ac572b10-b3fa-4bf7-b028-a5501566252f -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id adacccc7-dd13-4a0e-a8d2-8aaf97f6e585 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ade3bd15-7d09-48a5-b0a2-3e217e9c33c1 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ae20d5db-387c-490f-a9c7-60ffb5e59738 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id aec595a5-1789-470a-b3d6-11a2deb7bbde -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b2be4f60-e5b8-4b7f-9a8a-e0ec7ec15666 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b2cd66cf-9d85-4e80-9ebd-f63e52cf5b2b -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b37dd5b7-745d-49b6-b83b-78627f2e2653 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b80c119e-08ce-4ec8-838c-312ae14dd036 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b8cc0ce3-321c-47fd-8bdd-56adb0f13c78 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b9d55f70-553e-426c-a058-371876a5e3a7 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bab1586a-241a-4e28-be27-f7b3392f4e59 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bab44e8c-14f9-4519-9f21-993d9a19d6fd -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bacf8852-40be-4efa-a880-59193a23a06c -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bdb0495f-8f34-4e3a-8705-957f1b5e3ae9 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id be9dd95f-aaa6-471b-aee1-326bcf2059aa -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf80b90a-4e2d-4b21-96e0-01d681e94135 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c2d3fa70-801d-4e92-8414-a9f45d430ae0 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c33067f2-8cb6-4bfb-9599-e921f1d86f3a -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c45d351c-1713-4a3e-9689-2560c6ea4cd5 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c735c7e3-c546-435d-b3ca-8fccba5334be -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ca31d162-4248-48db-8102-04db891b8ff5 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cb119cc7-8330-4b60-8aad-22c0a8150317 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cb411b95-af33-49aa-ba21-728d2cf59ecc -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cb43634e-27ff-450a-b1a6-da438c2c031e -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cba2050d-abe2-4f85-828c-a39c569f7dfa -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cffb108c-af45-46a9-ba90-fe6fa17e8804 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d03f36d8-5202-4e3a-8794-bfd6fdfa6d9e -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d0e21af2-a5ad-4e31-866b-1d04ce256169 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d8fba165-ee5d-4c29-bf2a-c8455d51fd75 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id dd290874-42c0-4350-a8d4-4455c07c7805 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id dd8d792d-2213-45f8-997f-fa3e0489cbdf -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id dd9d02fd-0793-4334-99a7-85dc4aba2266 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id de8d49ed-07d7-4760-b523-d33bb0e3cfbd -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e4f3c5f1-6445-4448-a39a-93ea723b9e40 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e552e877-a094-42cf-aea0-657290923e22 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e752d030-ff34-4380-b07c-2c884170ed4a -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e7ac45a4-a7b3-401f-9cc6-bc457d321b9c -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ea140b9e-480a-490c-abdf-a604baafd1bf -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ef747d77-2cf7-412a-aab8-c7d82f2b0636 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f02a98fc-9cf6-4dc0-87d1-ac1978d16808 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f1bf399c-f5ee-4971-af26-73ef082f7577 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f28d5b06-a992-4272-b41e-dec94dfe5a4a -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f5539f9e-8e4a-46bf-bb4b-d1fa0f80df7e -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f5bb01c6-16c3-4c64-9539-cccdf55094fe -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f6c9d68d-3043-4368-896c-22495e921cfd -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f74c9f5d-a88c-4fc1-8dcd-9fb563ef81bb -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f950aae1-1b33-4d78-9473-39e5041e358b -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id feeec67e-3c88-467e-90fe-485785f6b683 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 -> edge target key: 89 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:43:47 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '6dd1a3cb-e9cc-4cb2-9bbf-03579c8d592e' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_3(NetworkSimulator.groovy:363) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:47 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator with query - single policy simulation > Verify NetworkPolicy Simulator with query - single policy simulation [scope: , orchestratorDepsShouldExist: true, #1] PASSED NetworkSimulator > Verify NetworkPolicy Simulator with delete policies > Verify NetworkPolicy Simulator with delete policies [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] STANDARD_OUT 05:43:47 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator with delete policies [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | allow-ingress-application-web: NetworkPolicy created: 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: allow-ingress-application-web namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: - additionalProperties: {} from: - additionalProperties: {} namespaceSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} ports: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: app: web policyTypes: [] 05:43:47 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 20231452-e84e-4a63-a2ac-53ed01493ff5 -> edge target key: 8 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 31a01872-ed06-4a57-89f8-aeef141126ef -> edge target key: 8 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4fffad70-170f-42fe-8484-340c19e7e648 -> edge target key: 8 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 70c90956-ec6f-4762-846e-5d4d6ac0e649 -> edge target key: 8 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7937882b-93f5-4c7f-83a9-486a679b86b6 -> edge target key: 8 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 -> edge target key: 8 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ade3bd15-7d09-48a5-b0a2-3e217e9c33c1 -> edge target key: 8 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b9d55f70-553e-426c-a058-371876a5e3a7 -> edge target key: 8 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf80b90a-4e2d-4b21-96e0-01d681e94135 -> edge target key: 8 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c735c7e3-c546-435d-b3ca-8fccba5334be -> edge target key: 8 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cffb108c-af45-46a9-ba90-fe6fa17e8804 -> edge target key: 8 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f1bf399c-f5ee-4971-af26-73ef082f7577 -> edge target key: 8 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id feeec67e-3c88-467e-90fe-485785f6b683 -> edge target key: 8 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 29 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 8321d3c1-7836-46e6-baa2-641e440a06e5, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 8321d3c1-7836-46e6-baa2-641e440a06e5, targetId null 05:43:47 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:47 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:43:48 | DEBUG | NetworkSimulator | Kubernetes | allow-ingress-application-web: NetworkPolicy removed. 05:43:48 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id 'c78cc1e4-f821-4522-82aa-10692d61eb07' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_4(NetworkSimulator.groovy:455) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:48 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id 'e2fc2ca6-6a2c-453f-807f-b324886dc3e7' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_4(NetworkSimulator.groovy:455) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:48 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator with delete policies > Verify NetworkPolicy Simulator with delete policies [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] PASSED NetworkSimulator > Verify NetworkPolicy Simulator with delete policies > Verify NetworkPolicy Simulator with delete policies [scope: , orchestratorDepsShouldExist: true, #1] STANDARD_OUT 05:43:48 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator with delete policies [scope: , orchestratorDepsShouldExist: true, #1] 05:43:48 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:43:48 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:43:48 | DEBUG | NetworkSimulator | Kubernetes | allow-ingress-application-web: NetworkPolicy created: 05:43:48 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: allow-ingress-application-web namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: - additionalProperties: {} from: - additionalProperties: {} namespaceSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} ports: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: app: web policyTypes: [] 05:43:48 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 000de9eb-d41a-4180-b264-756bf0003f70 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 02248886-e801-44b6-9e92-7bac24d99732 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05b30a60-9240-45e8-bf2e-44d9cd1902e3 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 067358fc-054c-4d85-8dd9-b9a17377273e -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0b7f6534-a038-42f2-aee3-462b0ea1f8ea -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cb9b442-d073-4c2b-8bf0-bbe08ca0c623 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cd29685-34cc-49f4-b410-bc23616d3896 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0eaca895-b9ec-4016-96d5-ceb5eefa3bf1 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 11d4363a-beab-497a-b86b-4006d711ea65 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 13a2dca4-c0e8-4b0b-a44c-212a3d628874 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 16788bfd-a1b7-4fea-af32-8dd73a624f9d -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 17f759cf-0607-473d-9f93-ceb806aebcf6 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1a06bba6-3027-4fb4-94f8-2106b4773a3f -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1cd7f647-1007-4d88-9fec-ee6ae13ff751 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1e21e3ca-64ea-49d9-8ba3-14b799e9e093 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 20231452-e84e-4a63-a2ac-53ed01493ff5 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 280f9886-262a-471a-86ed-d6804386e2eb -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2ac1ce30-50e5-4171-b50e-400f7ccdaf46 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2d699a4f-2005-4993-8c9a-35b7aae971ec -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2fdeb41a-f418-4773-845c-61376973e9e0 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3193d3d5-4d3a-4c8e-9a8e-e3205fa4769b -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 31a01872-ed06-4a57-89f8-aeef141126ef -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 31ace024-0e67-4721-a3ac-9d4d10995736 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 344ae9ac-6c30-4c0f-83e4-5ffd22eb487e -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 35d0f52d-5b6c-448a-925e-add2805a43d1 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 36ed1194-e260-4d9f-93d5-f7a7189582fb -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 38c1298b-594c-4b0b-825a-196e1e42e566 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3a18bf67-f1a4-45be-ab5f-8a42a3630e53 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3f006a91-705e-4e64-97b3-225a0428f805 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3fc85660-95c3-4e56-9ba1-a6bf4f0c2fe7 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 49d52088-d5c3-4ca6-abbf-3c556d159cc2 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4dc1f20d-06ad-46c3-b715-7dd127e464e5 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4e28dc8a-5e1e-4749-bdf2-c10dec3ae844 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4ef37528-d774-444f-9bb8-814bffa0b6ef -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4fffad70-170f-42fe-8484-340c19e7e648 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 525af6f9-c7e5-4227-877b-55e8b6de55cf -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 54b8b9af-981f-4afd-b8ea-35a0b8bb3d6a -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 56db824f-429a-4472-8f98-44c317ba7a8c -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 58701cbb-bdfb-4651-8841-cce0520bf13b -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 59181e74-454f-4db0-a203-e76001d024e7 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a2564f4-89d3-4cbd-a219-a72c5c67dd44 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a64de51-f8f2-4e54-9b38-3e4f12c618b4 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a69ae46-7728-45fb-9829-fcf1a3cc150a -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a73488a-2940-4ce8-8c0c-c2f384b175e5 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5b3af827-c357-443c-baa3-da881673cfab -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5ce74e99-4503-406b-a730-359bb7403799 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 64e5ebd3-7cac-4bfc-b62f-91c0637f5194 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 66f49a2c-6ff7-4e81-ac2e-691f64b2fca0 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 67a3c4c6-193e-4dcf-a3e6-05a62f5c57dc -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6805c8f2-7b97-4cce-a9e4-1878f456e667 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6c422df9-43eb-475f-a7cf-c013d10c4a9e -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 70c90956-ec6f-4762-846e-5d4d6ac0e649 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 735b4eb7-5c1b-4cc8-8b82-3bef7ebc6a1a -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 73991272-2120-41b7-b3a0-ce0e046f90cc -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 75de0a0f-22ae-47a4-8ea8-4ac3f399ec29 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7860996d-12af-4a11-94cc-38a3b594f132 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7937882b-93f5-4c7f-83a9-486a679b86b6 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7bc5eeff-f3bc-47e7-97d0-49b039ee4533 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7bcf11fc-23b7-46c6-9251-abf3fe7a0f18 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7c77864e-eb41-4566-addd-7c0ab1f304ba -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7c92fbcf-4fcc-4779-a803-f3e8fac90609 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7e34ec9d-ebcf-4f3d-a366-8e7cd5c0c059 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 800b2d7f-5e37-462d-9765-96742feac3e2 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 86eef77a-86f8-4880-be4e-59c5e1c72090 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8e19871f-5ad6-4fa3-8057-0949bb6aac13 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8ed0ef99-949c-4611-b355-9f26442254ec -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9170fc31-968b-45ee-a990-b3cc262f4f24 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 938e776b-be1a-4197-ad00-59c8dd47b9eb -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9570b4b5-e84a-45fa-9fe1-d28d5a9efe86 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9612ff09-4288-401a-847f-a1013448c21a -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9784f7ae-c77d-48f5-aeed-3ed6df541d45 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9e3a5619-a524-4227-856a-a9dac38b7f83 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9e9d5412-1b4b-4c53-a030-e5d71ff758c7 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9f499770-4ddc-416f-a886-349e93464810 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1039493-3cad-4fe2-80d3-2f9d72652592 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a16fe598-3422-4d53-aebe-3877a26f843c -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1815365-6391-4c21-8408-5f86be4e300c -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a2076b4d-b027-42a3-b6b8-55b1183a9772 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a2432711-7f3b-4812-897d-29b38dc2fabc -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a68991f5-7608-4cfd-b8bc-77c3636aaa4d -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6a0308f-a62f-4fc9-b5d5-a1bb2139ca68 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a9cdb2ec-ce9c-4506-bdc6-7541c292ac10 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ab507529-a40d-4b0f-979d-dd33f069d5c8 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ac572b10-b3fa-4bf7-b028-a5501566252f -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id adacccc7-dd13-4a0e-a8d2-8aaf97f6e585 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ade3bd15-7d09-48a5-b0a2-3e217e9c33c1 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ae20d5db-387c-490f-a9c7-60ffb5e59738 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id aec595a5-1789-470a-b3d6-11a2deb7bbde -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b2be4f60-e5b8-4b7f-9a8a-e0ec7ec15666 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b2cd66cf-9d85-4e80-9ebd-f63e52cf5b2b -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b37dd5b7-745d-49b6-b83b-78627f2e2653 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b80c119e-08ce-4ec8-838c-312ae14dd036 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b8cc0ce3-321c-47fd-8bdd-56adb0f13c78 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b9d55f70-553e-426c-a058-371876a5e3a7 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bab1586a-241a-4e28-be27-f7b3392f4e59 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bab44e8c-14f9-4519-9f21-993d9a19d6fd -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bacf8852-40be-4efa-a880-59193a23a06c -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bdb0495f-8f34-4e3a-8705-957f1b5e3ae9 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id be9dd95f-aaa6-471b-aee1-326bcf2059aa -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf80b90a-4e2d-4b21-96e0-01d681e94135 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c2d3fa70-801d-4e92-8414-a9f45d430ae0 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c33067f2-8cb6-4bfb-9599-e921f1d86f3a -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c45d351c-1713-4a3e-9689-2560c6ea4cd5 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c735c7e3-c546-435d-b3ca-8fccba5334be -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ca31d162-4248-48db-8102-04db891b8ff5 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cb119cc7-8330-4b60-8aad-22c0a8150317 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cb411b95-af33-49aa-ba21-728d2cf59ecc -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cb43634e-27ff-450a-b1a6-da438c2c031e -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cba2050d-abe2-4f85-828c-a39c569f7dfa -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cffb108c-af45-46a9-ba90-fe6fa17e8804 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d03f36d8-5202-4e3a-8794-bfd6fdfa6d9e -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d0e21af2-a5ad-4e31-866b-1d04ce256169 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d8fba165-ee5d-4c29-bf2a-c8455d51fd75 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id dd290874-42c0-4350-a8d4-4455c07c7805 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id dd8d792d-2213-45f8-997f-fa3e0489cbdf -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id dd9d02fd-0793-4334-99a7-85dc4aba2266 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id de8d49ed-07d7-4760-b523-d33bb0e3cfbd -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e4f3c5f1-6445-4448-a39a-93ea723b9e40 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e552e877-a094-42cf-aea0-657290923e22 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e752d030-ff34-4380-b07c-2c884170ed4a -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e7ac45a4-a7b3-401f-9cc6-bc457d321b9c -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ea140b9e-480a-490c-abdf-a604baafd1bf -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ef747d77-2cf7-412a-aab8-c7d82f2b0636 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f02a98fc-9cf6-4dc0-87d1-ac1978d16808 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f1bf399c-f5ee-4971-af26-73ef082f7577 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f28d5b06-a992-4272-b41e-dec94dfe5a4a -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f5539f9e-8e4a-46bf-bb4b-d1fa0f80df7e -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f5bb01c6-16c3-4c64-9539-cccdf55094fe -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f6c9d68d-3043-4368-896c-22495e921cfd -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f74c9f5d-a88c-4fc1-8dcd-9fb563ef81bb -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f950aae1-1b33-4d78-9473-39e5041e358b -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id feeec67e-3c88-467e-90fe-485785f6b683 -> edge target key: 71 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 149 source node(s) 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 8321d3c1-7836-46e6-baa2-641e440a06e5, targetId null 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 8321d3c1-7836-46e6-baa2-641e440a06e5, targetId null 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:48 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:43:48 | DEBUG | NetworkSimulator | Kubernetes | allow-ingress-application-web: NetworkPolicy removed. 05:43:48 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id 'fba1df8e-104b-486f-b784-eccaa9d68878' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_4(NetworkSimulator.groovy:455) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:48 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '4dfc931e-ba13-435d-a79f-7d3c7cd60bcd' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_4(NetworkSimulator.groovy:455) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:48 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator with delete policies > Verify NetworkPolicy Simulator with delete policies [scope: , orchestratorDepsShouldExist: true, #1] PASSED NetworkSimulator > Verify NetworkPolicy Simulator allow traffic to an application from all namespaces STANDARD_OUT 05:43:48 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator allow traffic to an application from all namespaces 05:43:48 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 000de9eb-d41a-4180-b264-756bf0003f70 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 02248886-e801-44b6-9e92-7bac24d99732 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05b30a60-9240-45e8-bf2e-44d9cd1902e3 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 067358fc-054c-4d85-8dd9-b9a17377273e -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0b7f6534-a038-42f2-aee3-462b0ea1f8ea -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cb9b442-d073-4c2b-8bf0-bbe08ca0c623 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cd29685-34cc-49f4-b410-bc23616d3896 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0eaca895-b9ec-4016-96d5-ceb5eefa3bf1 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 11d4363a-beab-497a-b86b-4006d711ea65 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 13a2dca4-c0e8-4b0b-a44c-212a3d628874 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 16788bfd-a1b7-4fea-af32-8dd73a624f9d -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 17f759cf-0607-473d-9f93-ceb806aebcf6 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1a06bba6-3027-4fb4-94f8-2106b4773a3f -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1cd7f647-1007-4d88-9fec-ee6ae13ff751 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1e21e3ca-64ea-49d9-8ba3-14b799e9e093 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 20231452-e84e-4a63-a2ac-53ed01493ff5 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 280f9886-262a-471a-86ed-d6804386e2eb -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2ac1ce30-50e5-4171-b50e-400f7ccdaf46 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2d699a4f-2005-4993-8c9a-35b7aae971ec -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2fdeb41a-f418-4773-845c-61376973e9e0 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3193d3d5-4d3a-4c8e-9a8e-e3205fa4769b -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 31a01872-ed06-4a57-89f8-aeef141126ef -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 31ace024-0e67-4721-a3ac-9d4d10995736 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 344ae9ac-6c30-4c0f-83e4-5ffd22eb487e -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 35d0f52d-5b6c-448a-925e-add2805a43d1 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 36ed1194-e260-4d9f-93d5-f7a7189582fb -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 38c1298b-594c-4b0b-825a-196e1e42e566 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3a18bf67-f1a4-45be-ab5f-8a42a3630e53 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3f006a91-705e-4e64-97b3-225a0428f805 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3fc85660-95c3-4e56-9ba1-a6bf4f0c2fe7 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 49d52088-d5c3-4ca6-abbf-3c556d159cc2 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4dc1f20d-06ad-46c3-b715-7dd127e464e5 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4e28dc8a-5e1e-4749-bdf2-c10dec3ae844 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4ef37528-d774-444f-9bb8-814bffa0b6ef -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4fffad70-170f-42fe-8484-340c19e7e648 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 525af6f9-c7e5-4227-877b-55e8b6de55cf -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 54b8b9af-981f-4afd-b8ea-35a0b8bb3d6a -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 56db824f-429a-4472-8f98-44c317ba7a8c -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 58701cbb-bdfb-4651-8841-cce0520bf13b -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 59181e74-454f-4db0-a203-e76001d024e7 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a2564f4-89d3-4cbd-a219-a72c5c67dd44 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a64de51-f8f2-4e54-9b38-3e4f12c618b4 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a69ae46-7728-45fb-9829-fcf1a3cc150a -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5a73488a-2940-4ce8-8c0c-c2f384b175e5 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5b3af827-c357-443c-baa3-da881673cfab -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5ce74e99-4503-406b-a730-359bb7403799 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 64e5ebd3-7cac-4bfc-b62f-91c0637f5194 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 66f49a2c-6ff7-4e81-ac2e-691f64b2fca0 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 67a3c4c6-193e-4dcf-a3e6-05a62f5c57dc -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6805c8f2-7b97-4cce-a9e4-1878f456e667 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6c422df9-43eb-475f-a7cf-c013d10c4a9e -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 70c90956-ec6f-4762-846e-5d4d6ac0e649 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 735b4eb7-5c1b-4cc8-8b82-3bef7ebc6a1a -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 73991272-2120-41b7-b3a0-ce0e046f90cc -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 75de0a0f-22ae-47a4-8ea8-4ac3f399ec29 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7860996d-12af-4a11-94cc-38a3b594f132 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7937882b-93f5-4c7f-83a9-486a679b86b6 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7bc5eeff-f3bc-47e7-97d0-49b039ee4533 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7bcf11fc-23b7-46c6-9251-abf3fe7a0f18 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7c77864e-eb41-4566-addd-7c0ab1f304ba -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7c92fbcf-4fcc-4779-a803-f3e8fac90609 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7e34ec9d-ebcf-4f3d-a366-8e7cd5c0c059 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 800b2d7f-5e37-462d-9765-96742feac3e2 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 86eef77a-86f8-4880-be4e-59c5e1c72090 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8e19871f-5ad6-4fa3-8057-0949bb6aac13 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8ed0ef99-949c-4611-b355-9f26442254ec -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9170fc31-968b-45ee-a990-b3cc262f4f24 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 938e776b-be1a-4197-ad00-59c8dd47b9eb -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9570b4b5-e84a-45fa-9fe1-d28d5a9efe86 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9612ff09-4288-401a-847f-a1013448c21a -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9784f7ae-c77d-48f5-aeed-3ed6df541d45 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9e3a5619-a524-4227-856a-a9dac38b7f83 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9e9d5412-1b4b-4c53-a030-e5d71ff758c7 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9f499770-4ddc-416f-a886-349e93464810 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1039493-3cad-4fe2-80d3-2f9d72652592 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a16fe598-3422-4d53-aebe-3877a26f843c -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1815365-6391-4c21-8408-5f86be4e300c -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a2076b4d-b027-42a3-b6b8-55b1183a9772 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a2432711-7f3b-4812-897d-29b38dc2fabc -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a68991f5-7608-4cfd-b8bc-77c3636aaa4d -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6a0308f-a62f-4fc9-b5d5-a1bb2139ca68 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a9cdb2ec-ce9c-4506-bdc6-7541c292ac10 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ab507529-a40d-4b0f-979d-dd33f069d5c8 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ab722ab9-6a5f-4cd3-87b5-a4a17157b3e0 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ac572b10-b3fa-4bf7-b028-a5501566252f -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id adacccc7-dd13-4a0e-a8d2-8aaf97f6e585 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ade3bd15-7d09-48a5-b0a2-3e217e9c33c1 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ae20d5db-387c-490f-a9c7-60ffb5e59738 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id aec595a5-1789-470a-b3d6-11a2deb7bbde -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b2be4f60-e5b8-4b7f-9a8a-e0ec7ec15666 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b2cd66cf-9d85-4e80-9ebd-f63e52cf5b2b -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b37dd5b7-745d-49b6-b83b-78627f2e2653 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b80c119e-08ce-4ec8-838c-312ae14dd036 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b8cc0ce3-321c-47fd-8bdd-56adb0f13c78 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b9d55f70-553e-426c-a058-371876a5e3a7 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bab1586a-241a-4e28-be27-f7b3392f4e59 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bab44e8c-14f9-4519-9f21-993d9a19d6fd -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bacf8852-40be-4efa-a880-59193a23a06c -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bdb0495f-8f34-4e3a-8705-957f1b5e3ae9 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id be9dd95f-aaa6-471b-aee1-326bcf2059aa -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf80b90a-4e2d-4b21-96e0-01d681e94135 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c2d3fa70-801d-4e92-8414-a9f45d430ae0 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c33067f2-8cb6-4bfb-9599-e921f1d86f3a -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c45d351c-1713-4a3e-9689-2560c6ea4cd5 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c735c7e3-c546-435d-b3ca-8fccba5334be -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ca31d162-4248-48db-8102-04db891b8ff5 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cb119cc7-8330-4b60-8aad-22c0a8150317 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cb411b95-af33-49aa-ba21-728d2cf59ecc -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cb43634e-27ff-450a-b1a6-da438c2c031e -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cba2050d-abe2-4f85-828c-a39c569f7dfa -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id cffb108c-af45-46a9-ba90-fe6fa17e8804 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d03f36d8-5202-4e3a-8794-bfd6fdfa6d9e -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d0e21af2-a5ad-4e31-866b-1d04ce256169 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d8fba165-ee5d-4c29-bf2a-c8455d51fd75 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id dd290874-42c0-4350-a8d4-4455c07c7805 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id dd8d792d-2213-45f8-997f-fa3e0489cbdf -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id dd9d02fd-0793-4334-99a7-85dc4aba2266 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id de8d49ed-07d7-4760-b523-d33bb0e3cfbd -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e4f3c5f1-6445-4448-a39a-93ea723b9e40 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e552e877-a094-42cf-aea0-657290923e22 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e752d030-ff34-4380-b07c-2c884170ed4a -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e7ac45a4-a7b3-401f-9cc6-bc457d321b9c -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ea140b9e-480a-490c-abdf-a604baafd1bf -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ef747d77-2cf7-412a-aab8-c7d82f2b0636 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f02a98fc-9cf6-4dc0-87d1-ac1978d16808 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f1bf399c-f5ee-4971-af26-73ef082f7577 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f28d5b06-a992-4272-b41e-dec94dfe5a4a -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f5539f9e-8e4a-46bf-bb4b-d1fa0f80df7e -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f5bb01c6-16c3-4c64-9539-cccdf55094fe -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f6c9d68d-3043-4368-896c-22495e921cfd -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f74c9f5d-a88c-4fc1-8dcd-9fb563ef81bb -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f950aae1-1b33-4d78-9473-39e5041e358b -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id feeec67e-3c88-467e-90fe-485785f6b683 -> edge target key: 98 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 8321d3c1-7836-46e6-baa2-641e440a06e5, targetId null 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:48 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator allow traffic to an application from all namespaces PASSED NetworkSimulator > Verify yaml requires namespace in metadata STANDARD_OUT 05:43:48 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify yaml requires namespace in metadata 05:43:48 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:48 | ERROR | NetworkSimulator | NetworkPolicyService | Error generating simulation using YAML io.grpc.StatusRuntimeException: INVALID_ARGUMENT: invalid arguments: yamls tested against must apply to a namespace at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.simulateNetworkGraph(NetworkPolicyServiceGrpc.java:846) [3 skipped] at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy:81) at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy) at NetworkSimulator.$spock_feature_1_6(NetworkSimulator.groovy:537) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:48 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify yaml requires namespace in metadata PASSED NetworkSimulator > Verify malformed yaml returns error STANDARD_OUT 05:43:48 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify malformed yaml returns error 05:43:48 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:48 | ERROR | NetworkSimulator | NetworkPolicyService | Error generating simulation using YAML io.grpc.StatusRuntimeException: INTERNAL: invalid Yaml document separator: additionalProperties:{}apiVersion:networking.k8s.io/v1kind:NetworkPolicymetadata:additionalProperties:{}annotations:{}finalizers:[]labels:{}managedFields:[]name:missing-namespaceownerReferences:[]spec:additionalProperties:{}egress:[]ingress:[]policyTypes:[] at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.simulateNetworkGraph(NetworkPolicyServiceGrpc.java:846) [3 skipped] at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy:81) at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy) at NetworkSimulator.$spock_feature_1_7(NetworkSimulator.groovy:550) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:48 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:48 | ERROR | NetworkSimulator | NetworkPolicyService | Error generating simulation using YAML io.grpc.StatusRuntimeException: INTERNAL: error converting YAML to JSON: yaml: line 18: could not find expected ':' at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.simulateNetworkGraph(NetworkPolicyServiceGrpc.java:846) [3 skipped] at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy:81) at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy) at NetworkSimulator.$spock_feature_1_7(NetworkSimulator.groovy:552) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:48 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:48 | ERROR | NetworkSimulator | NetworkPolicyService | Error generating simulation using YAML io.grpc.StatusRuntimeException: INTERNAL: error converting YAML to JSON: yaml: line 3: could not find expected ':' at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.simulateNetworkGraph(NetworkPolicyServiceGrpc.java:846) [3 skipped] at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy:81) at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy) at NetworkSimulator.$spock_feature_1_7(NetworkSimulator.groovy:556) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:48 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify malformed yaml returns error PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-ingress-to-app STANDARD_OUT 05:43:48 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-ingress-to-app 05:43:48 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:48 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:48 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-ingress-to-app PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-egress-from-app STANDARD_OUT 05:43:48 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-egress-from-app 05:43:49 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-egress-from-app PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-ingress-egress-app STANDARD_OUT 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-ingress-egress-app 05:43:49 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-ingress-egress-app PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for ingress-only-from-app STANDARD_OUT 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for ingress-only-from-app 05:43:49 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 243db358-dc83-4e1a-9014-71e8b92a59dc -> edge target key: 98 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for ingress-only-from-app PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for egress-only-to-app STANDARD_OUT 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for egress-only-to-app 05:43:49 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b19b2f24-24ae-466c-b6f8-c8b101f50ed4 -> edge target key: 18 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 243db358-dc83-4e1a-9014-71e8b92a59dc 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for egress-only-to-app PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-ingress STANDARD_OUT 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-ingress 05:43:49 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-ingress PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-egress STANDARD_OUT 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-egress 05:43:49 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-egress PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-namespace-ingress STANDARD_OUT 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-namespace-ingress 05:43:49 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 147 source node(s) 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 243db358-dc83-4e1a-9014-71e8b92a59dc -> edge target key: 98 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 537c6ef5-3473-4935-a678-1e4ca0fc8403 -> edge target key: 98 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8321d3c1-7836-46e6-baa2-641e440a06e5 -> edge target key: 98 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b19b2f24-24ae-466c-b6f8-c8b101f50ed4 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-namespace-ingress PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-namespace-egress STANDARD_OUT 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-namespace-egress 05:43:49 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b19b2f24-24ae-466c-b6f8-c8b101f50ed4, targetId null 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b19b2f24-24ae-466c-b6f8-c8b101f50ed4 -> edge target key: 71 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 8321d3c1-7836-46e6-baa2-641e440a06e5 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b19b2f24-24ae-466c-b6f8-c8b101f50ed4 -> edge target key: 18 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 243db358-dc83-4e1a-9014-71e8b92a59dc 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b19b2f24-24ae-466c-b6f8-c8b101f50ed4 -> edge target key: 41 05:43:49 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 537c6ef5-3473-4935-a678-1e4ca0fc8403 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-namespace-egress PASSED NetworkSimulator > Verify invalid clusterId passed to notification API STANDARD_OUT 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify invalid clusterId passed to notification API 05:43:49 | DEBUG | NetworkSimulator | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:43:49 | ERROR | NetworkSimulator | NetworkPolicyService | io.grpc.StatusRuntimeException: NOT_FOUND: Cluster '11111111-bbbb-0000-aaaa-111111111111' not found: not found io.grpc.StatusRuntimeException: NOT_FOUND: Cluster '11111111-bbbb-0000-aaaa-111111111111' not found: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.sendNetworkPolicyYAML(NetworkPolicyServiceGrpc.java:853) [3 skipped] at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:101) at NetworkSimulator.$spock_feature_1_9(NetworkSimulator.groovy:686) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:49 | ERROR | NetworkSimulator | NetworkPolicyService | io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Cluster ID must be specified: invalid arguments io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Cluster ID must be specified: invalid arguments at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.sendNetworkPolicyYAML(NetworkPolicyServiceGrpc.java:853) [3 skipped] at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:101) at NetworkSimulator.$spock_feature_1_9(NetworkSimulator.groovy:690) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:49 | ERROR | NetworkSimulator | NetworkPolicyService | io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Cluster ID must be specified: invalid arguments io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Cluster ID must be specified: invalid arguments at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.sendNetworkPolicyYAML(NetworkPolicyServiceGrpc.java:853) [3 skipped] at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:101) at NetworkSimulator.$spock_feature_1_9(NetworkSimulator.groovy:694) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify invalid clusterId passed to notification API PASSED NetworkSimulator > Verify invalid notifierId passed to notification API STANDARD_OUT 05:43:49 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify invalid notifierId passed to notification API 05:43:50 | ERROR | NetworkSimulator | NetworkPolicyService | io.grpc.StatusRuntimeException: INTERNAL: unable to use all requested notifiers error: notifier with id:11111111-bbbb-0000-aaaa-111111111111 not found io.grpc.StatusRuntimeException: INTERNAL: unable to use all requested notifiers error: notifier with id:11111111-bbbb-0000-aaaa-111111111111 not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.sendNetworkPolicyYAML(NetworkPolicyServiceGrpc.java:853) [3 skipped] at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:101) at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:90) at NetworkSimulator.$spock_feature_1_10(NetworkSimulator.groovy:715) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:50 | ERROR | NetworkSimulator | NetworkPolicyService | io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Notifier IDs must be specified: invalid arguments io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Notifier IDs must be specified: invalid arguments at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.sendNetworkPolicyYAML(NetworkPolicyServiceGrpc.java:853) [3 skipped] at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:101) at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:90) at NetworkSimulator.$spock_feature_1_10(NetworkSimulator.groovy:718) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:50 | ERROR | NetworkSimulator | NetworkPolicyService | io.grpc.StatusRuntimeException: INTERNAL: unable to use all requested notifiers error: notifier with id: not found io.grpc.StatusRuntimeException: INTERNAL: unable to use all requested notifiers error: notifier with id: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.sendNetworkPolicyYAML(NetworkPolicyServiceGrpc.java:853) [3 skipped] at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:101) at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:90) at NetworkSimulator.$spock_feature_1_10(NetworkSimulator.groovy:721) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:43:50 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify invalid notifierId passed to notification API PASSED NetworkSimulator STANDARD_OUT 05:43:50 | DEBUG | NetworkSimulator | Kubernetes | Removed the deployment: web 05:43:50 | DEBUG | NetworkSimulator | Kubernetes | Removed the deployment: alt-web 05:43:50 | DEBUG | NetworkSimulator | Kubernetes | Removed the deployment: client 05:43:50 | DEBUG | NetworkSimulator | Kubernetes | Removed the deployment: alt-client 05:43:50 | INFO | NetworkSimulator | NetworkSimulator | Ending testsuite 05:43:50 | INFO | NetworkSimulator | NetworkSimulator | Checking if cluster is healthy after test 05:43:50 | DEBUG | NetworkSimulator | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries NodeInventoryTest > Verify node inventories and their scans SKIPPED NodeTest STANDARD_OUT 05:43:50 | INFO | NodeTest | NodeTest | Starting testsuite NodeTest > Verify node details STANDARD_OUT 05:43:50 | INFO | NodeTest | NodeTest | Starting testcase: Verify node details 05:43:50 | INFO | NodeTest | Helpers | Removing long annotation value from comparison: key: k8s.ovn.org/l3-gateway-config, length: 279 05:43:50 | INFO | NodeTest | Helpers | Removing long annotation value from comparison: key: k8s.ovn.org/l3-gateway-config, length: 285 05:43:50 | INFO | NodeTest | Helpers | Removing long annotation value from comparison: key: k8s.ovn.org/l3-gateway-config, length: 287 05:43:50 | INFO | NodeTest | Helpers | Removing long annotation value from comparison: key: k8s.ovn.org/l3-gateway-config, length: 285 05:43:50 | INFO | NodeTest | Helpers | Removing long annotation value from comparison: key: k8s.ovn.org/l3-gateway-config, length: 290 05:43:50 | INFO | NodeTest | Helpers | Removing long annotation value from comparison: key: k8s.ovn.org/l3-gateway-config, length: 282 05:43:50 | INFO | NodeTest | NodeTest | Ending testcase NodeTest > Verify node details PASSED NodeTest STANDARD_OUT 05:43:50 | INFO | NodeTest | NodeTest | Ending testsuite 05:43:50 | INFO | NodeTest | NodeTest | Checking if cluster is healthy after test 05:43:50 | DEBUG | NodeTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries PaginationTest STANDARD_OUT 05:43:50 | INFO | PaginationTest | PaginationTest | Starting testsuite 05:43:50 | DEBUG | PaginationTest | Kubernetes | pagination-secret-1: secret created. 05:43:50 | DEBUG | PaginationTest | Kubernetes | pagination-secret-2: secret created. 05:43:50 | DEBUG | PaginationTest | Kubernetes | pagination-secret-3: secret created. 05:43:50 | DEBUG | PaginationTest | Kubernetes | pagination-secret-4: secret created. 05:43:50 | DEBUG | PaginationTest | Kubernetes | pagination-secret-5: secret created. 05:43:50 | DEBUG | PaginationTest | Kubernetes | pagination-secret-6: secret created. 05:43:50 | DEBUG | PaginationTest | OpenShift | Namespace qa already exists 05:43:50 | DEBUG | PaginationTest | Kubernetes | Told the orchestrator to createOrReplace pagination1 05:43:50 | DEBUG | PaginationTest | OpenShift | Namespace qa already exists 05:43:50 | DEBUG | PaginationTest | Kubernetes | Told the orchestrator to createOrReplace pagination2 05:43:50 | DEBUG | PaginationTest | OpenShift | Namespace qa already exists 05:43:50 | DEBUG | PaginationTest | Kubernetes | Told the orchestrator to createOrReplace pagination3 05:43:50 | DEBUG | PaginationTest | OpenShift | Namespace qa already exists 05:43:51 | DEBUG | PaginationTest | Kubernetes | Told the orchestrator to createOrReplace pagination4 05:43:51 | DEBUG | PaginationTest | OpenShift | Namespace qa already exists 05:43:51 | DEBUG | PaginationTest | Kubernetes | Told the orchestrator to createOrReplace pagination5 05:43:51 | DEBUG | PaginationTest | OpenShift | Namespace qa already exists 05:43:51 | DEBUG | PaginationTest | Kubernetes | Told the orchestrator to createOrReplace pagination6 05:43:51 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination1 to start 05:43:51 | DEBUG | PaginationTest | Kubernetes | Status of pagination1's pods: 05:43:51 | DEBUG | PaginationTest | Kubernetes | - pagination1-d4b84d687-vkdqt Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:43:51 | DEBUG | PaginationTest | Kubernetes | 0/1 are in the ready state for pagination1 05:43:54 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination1 to start 05:43:54 | DEBUG | PaginationTest | Kubernetes | Status of pagination1's pods: 05:43:54 | DEBUG | PaginationTest | Kubernetes | - pagination1-d4b84d687-vkdqt Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:43:51Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:43:54 | DEBUG | PaginationTest | Kubernetes | All 1 replicas found in ready state for pagination1 05:43:54 | DEBUG | PaginationTest | Kubernetes | Took 3 seconds for k8s deployment pagination1 05:43:54 | DEBUG | PaginationTest | Kubernetes | Updating deployment pagination1 with 1 pods 05:43:54 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination2 to start 05:43:54 | DEBUG | PaginationTest | Kubernetes | Status of pagination2's pods: 05:43:54 | DEBUG | PaginationTest | Kubernetes | - pagination2-849d86cc8c-8vfs2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:43:51Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:43:54 | DEBUG | PaginationTest | Kubernetes | All 1 replicas found in ready state for pagination2 05:43:54 | DEBUG | PaginationTest | Kubernetes | Took 0 seconds for k8s deployment pagination2 05:43:54 | DEBUG | PaginationTest | Kubernetes | Updating deployment pagination2 with 1 pods 05:43:54 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination3 to start 05:43:54 | DEBUG | PaginationTest | Kubernetes | Status of pagination3's pods: 05:43:54 | DEBUG | PaginationTest | Kubernetes | - pagination3-c5fbb47bc-2fh7j Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:43:51Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:43:54 | DEBUG | PaginationTest | Kubernetes | All 1 replicas found in ready state for pagination3 05:43:54 | DEBUG | PaginationTest | Kubernetes | Took 0 seconds for k8s deployment pagination3 05:43:54 | DEBUG | PaginationTest | Kubernetes | Updating deployment pagination3 with 1 pods 05:43:54 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination4 to start 05:43:54 | DEBUG | PaginationTest | Kubernetes | Status of pagination4's pods: 05:43:54 | DEBUG | PaginationTest | Kubernetes | - pagination4-687f56d7b6-52ldl Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:43:51Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:43:54 | DEBUG | PaginationTest | Kubernetes | All 1 replicas found in ready state for pagination4 05:43:54 | DEBUG | PaginationTest | Kubernetes | Took 0 seconds for k8s deployment pagination4 05:43:54 | DEBUG | PaginationTest | Kubernetes | Updating deployment pagination4 with 1 pods 05:43:54 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination5 to start 05:43:54 | DEBUG | PaginationTest | Kubernetes | Status of pagination5's pods: 05:43:54 | DEBUG | PaginationTest | Kubernetes | - pagination5-7bdb9b9678-slb28 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:43:51Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:43:54 | DEBUG | PaginationTest | Kubernetes | All 1 replicas found in ready state for pagination5 05:43:54 | DEBUG | PaginationTest | Kubernetes | Took 0 seconds for k8s deployment pagination5 05:43:54 | DEBUG | PaginationTest | Kubernetes | Updating deployment pagination5 with 1 pods 05:43:54 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination6 to start 05:43:54 | DEBUG | PaginationTest | Kubernetes | Status of pagination6's pods: 05:43:54 | DEBUG | PaginationTest | Kubernetes | - pagination6-7547bcc67d-ftdl4 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:43:51Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:43:54 | DEBUG | PaginationTest | Kubernetes | All 1 replicas found in ready state for pagination6 05:43:54 | DEBUG | PaginationTest | Kubernetes | Took 0 seconds for k8s deployment pagination6 05:43:54 | DEBUG | PaginationTest | Kubernetes | Updating deployment pagination6 with 1 pods 05:43:54 | INFO | PaginationTest | Services | SR found deployment pagination1 within 0s 05:44:00 | INFO | PaginationTest | Services | SR found image quay.io/rhacs-eng/qa-multi-arch:busybox-1-32 within 6s 05:44:00 | INFO | PaginationTest | Services | SR found deployment pagination2 within 0s 05:44:06 | INFO | PaginationTest | Services | SR found image quay.io/rhacs-eng/qa-multi-arch:busybox-1-31 within 6s 05:44:06 | INFO | PaginationTest | Services | SR found deployment pagination3 within 0s 05:44:12 | INFO | PaginationTest | Services | SR found image quay.io/rhacs-eng/qa-multi-arch:busybox-1-30 within 5s 05:44:12 | INFO | PaginationTest | Services | SR found deployment pagination4 within 0s 05:44:18 | INFO | PaginationTest | Services | SR found image quay.io/rhacs-eng/qa-multi-arch:busybox-1-29 within 6s 05:44:18 | INFO | PaginationTest | Services | SR found deployment pagination5 within 0s 05:44:24 | INFO | PaginationTest | Services | SR found image quay.io/rhacs-eng/qa-multi-arch:busybox-1-28 within 6s 05:44:24 | INFO | PaginationTest | Services | SR found deployment pagination6 within 0s 05:44:30 | INFO | PaginationTest | Services | SR found image quay.io/rhacs-eng/qa-multi-arch:busybox-1-27 within 6s PaginationTest > Verify deployment pagination STANDARD_OUT 05:44:30 | INFO | PaginationTest | PaginationTest | Starting testcase: Verify deployment pagination 05:44:30 | INFO | PaginationTest | PaginationTest | Ending testcase PaginationTest > Verify deployment pagination PASSED PaginationTest > Verify image pagination STANDARD_OUT 05:44:30 | INFO | PaginationTest | PaginationTest | Starting testcase: Verify image pagination 05:44:30 | INFO | PaginationTest | PaginationTest | Ending testcase PaginationTest > Verify image pagination PASSED PaginationTest > Verify secret pagination STANDARD_OUT 05:44:30 | INFO | PaginationTest | PaginationTest | Starting testcase: Verify secret pagination 05:44:31 | INFO | PaginationTest | PaginationTest | Ending testcase PaginationTest > Verify secret pagination PASSED PaginationTest > Verify violation pagination STANDARD_OUT 05:44:31 | INFO | PaginationTest | PaginationTest | Starting testcase: Verify violation pagination 05:44:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:44:31 | INFO | PaginationTest | Services | violation size is: 1 05:44:31 | INFO | PaginationTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 05:44:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:44:31 | INFO | PaginationTest | Services | violation size is: 1 05:44:31 | INFO | PaginationTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 05:44:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:44:31 | INFO | PaginationTest | Services | violation size is: 1 05:44:31 | INFO | PaginationTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 05:44:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:44:31 | INFO | PaginationTest | Services | violation size is: 1 05:44:31 | INFO | PaginationTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 05:44:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:44:31 | INFO | PaginationTest | Services | violation size is: 1 05:44:31 | INFO | PaginationTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 05:44:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:44:31 | INFO | PaginationTest | Services | violation size is: 1 05:44:31 | INFO | PaginationTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 05:44:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:44:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:44:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:44:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:44:31 | INFO | PaginationTest | PaginationTest | Ending testcase PaginationTest > Verify violation pagination PASSED PaginationTest STANDARD_OUT 05:44:31 | DEBUG | PaginationTest | Kubernetes | Removed the deployment: pagination1 05:44:31 | DEBUG | PaginationTest | Kubernetes | Removed the deployment: pagination2 05:44:31 | DEBUG | PaginationTest | Kubernetes | Removed the deployment: pagination3 05:44:31 | DEBUG | PaginationTest | Kubernetes | Removed the deployment: pagination4 05:44:31 | DEBUG | PaginationTest | Kubernetes | Removed the deployment: pagination5 05:44:31 | DEBUG | PaginationTest | Kubernetes | Removed the deployment: pagination6 05:44:36 | DEBUG | PaginationTest | Kubernetes | pagination-secret-1: Secret removed. 05:44:41 | DEBUG | PaginationTest | Kubernetes | pagination-secret-2: Secret removed. 05:44:46 | DEBUG | PaginationTest | Kubernetes | pagination-secret-3: Secret removed. 05:44:51 | DEBUG | PaginationTest | Kubernetes | pagination-secret-4: Secret removed. 05:44:56 | DEBUG | PaginationTest | Kubernetes | pagination-secret-5: Secret removed. 05:45:01 | DEBUG | PaginationTest | Kubernetes | pagination-secret-6: Secret removed. 05:45:01 | INFO | PaginationTest | PaginationTest | Ending testsuite 05:45:01 | INFO | PaginationTest | PaginationTest | Checking if cluster is healthy after test 05:45:01 | DEBUG | PaginationTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries PolicyConfigurationTest STANDARD_OUT 05:45:01 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testsuite 05:45:01 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:45:01 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace deploymentnginx 05:45:01 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:45:01 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace qadefpolstruts 05:45:01 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:45:01 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace qaapachedns 05:45:01 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:45:01 | DEBUG | PolicyConfigurationTest | Kubernetes | deploymentnginx-lb service created 05:45:01 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for LB external IP for deploymentnginx-lb 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | LB IP: a871a47ac8eee4a09b991eb310a69e19-18543061.XXXXXXXXX.elb.amazonaws.com 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace deploymentnginx-lb 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for LB external IP for deploymentnginx-lb 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | LB IP: a871a47ac8eee4a09b991eb310a69e19-18543061.XXXXXXXXX.elb.amazonaws.com 05:45:06 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace deploymentnginx-np 05:45:06 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace deployment-rbac 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for deploymentnginx to start 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of deploymentnginx's pods: 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | - deploymentnginx-5dff8668d6-dd7qz Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:45:02Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for deploymentnginx 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 0 seconds for k8s deployment deploymentnginx 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment deploymentnginx with 1 pods 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for qadefpolstruts to start 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of qadefpolstruts's pods: 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | - qadefpolstruts-7777989f97-dz4f9 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:45:02Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for qadefpolstruts 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 0 seconds for k8s deployment qadefpolstruts 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment qadefpolstruts with 1 pods 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for qaapachedns to start 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of qaapachedns's pods: 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | - qaapachedns-7f587955b6-xgh82 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:45:02Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for qaapachedns 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 0 seconds for k8s deployment qaapachedns 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment qaapachedns with 1 pods 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for deploymentnginx-lb to start 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of deploymentnginx-lb's pods: 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | - deploymentnginx-lb-7c98c5c59-p4fj6 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:45:06 | DEBUG | PolicyConfigurationTest | Kubernetes | 0/1 are in the ready state for deploymentnginx-lb 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for deploymentnginx-lb to start 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of deploymentnginx-lb's pods: 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | - deploymentnginx-lb-7c98c5c59-p4fj6 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:45:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for deploymentnginx-lb 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 3 seconds for k8s deployment deploymentnginx-lb 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment deploymentnginx-lb with 1 pods 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for deploymentnginx-np to start 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of deploymentnginx-np's pods: 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | - deploymentnginx-np-d85448655-l86fn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:45:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for deploymentnginx-np 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 0 seconds for k8s deployment deploymentnginx-np 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment deploymentnginx-np with 1 pods 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for deployment-rbac to start 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of deployment-rbac's pods: 05:45:09 | DEBUG | PolicyConfigurationTest | Kubernetes | - deployment-rbac-7b4d6f7c85-rg46h Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=back-off 10s restarting failed container=deployment-rbac pod=deployment-rbac-7b4d6f7c85-rg46h_qa(7280a7cb-e1b3-4975-8e34-5de2d83f6771), reason=CrashLoopBackOff, additionalProperties={}), additionalProperties={})] 05:45:14 | DEBUG | PolicyConfigurationTest | Kubernetes | deployment-rbac: deployment created (skipped replica wait). 05:45:14 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment deployment-rbac with 1 pods 05:45:14 | INFO | PolicyConfigurationTest | Services | SR found deployment deploymentnginx within 0s 05:45:14 | INFO | PolicyConfigurationTest | Services | SR found deployment qadefpolstruts within 0s 05:45:14 | INFO | PolicyConfigurationTest | Services | SR found deployment qaapachedns within 0s 05:45:14 | INFO | PolicyConfigurationTest | Services | SR found deployment deploymentnginx-lb within 0s 05:45:14 | INFO | PolicyConfigurationTest | Services | SR found deployment deploymentnginx-np within 0s 05:45:14 | INFO | PolicyConfigurationTest | Services | deploymentID for [deployment-rbac] is null, checking orchestrator directly for deployment ID 05:45:14 | INFO | PolicyConfigurationTest | Services | SR found deployment deployment-rbac within 0s 05:45:14 | DEBUG | PolicyConfigurationTest | Kubernetes | deploymentnginx-np: Service created PolicyConfigurationTest > Verify name violations with same ID as existing image are still triggered STANDARD_OUT 05:45:14 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify name violations with same ID as existing image are still triggered 05:45:14 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:45:14 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace nginx-1-12-1-with-tag-and-digest 05:45:14 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for nginx-1-12-1-with-tag-and-digest to start 05:45:14 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of nginx-1-12-1-with-tag-and-digest's pods: 05:45:14 | DEBUG | PolicyConfigurationTest | Kubernetes | - nginx-1-12-1-with-tag-and-digest-7bff56f785-j9jsp Container status: [] 05:45:14 | DEBUG | PolicyConfigurationTest | Kubernetes | 0/1 are in the ready state for nginx-1-12-1-with-tag-and-digest 05:45:17 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for nginx-1-12-1-with-tag-and-digest to start 05:45:17 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of nginx-1-12-1-with-tag-and-digest's pods: 05:45:17 | DEBUG | PolicyConfigurationTest | Kubernetes | - nginx-1-12-1-with-tag-and-digest-7bff56f785-j9jsp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:45:15Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:45:17 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for nginx-1-12-1-with-tag-and-digest 05:45:17 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 3 seconds for k8s deployment nginx-1-12-1-with-tag-and-digest 05:45:17 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment nginx-1-12-1-with-tag-and-digest with 1 pods 05:45:18 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:45:18 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace nginx-latest 05:45:18 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for nginx-latest to start 05:45:18 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of nginx-latest's pods: 05:45:18 | DEBUG | PolicyConfigurationTest | Kubernetes | - nginx-latest-f6cb69878-wzrhc Container status: [] 05:45:18 | DEBUG | PolicyConfigurationTest | Kubernetes | 0/1 are in the ready state for nginx-latest 05:45:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for nginx-latest to start 05:45:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of nginx-latest's pods: 05:45:21 | DEBUG | PolicyConfigurationTest | Kubernetes | - nginx-latest-f6cb69878-wzrhc Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:45:18Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:45:21 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for nginx-latest 05:45:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 3 seconds for k8s deployment nginx-latest 05:45:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment nginx-latest with 1 pods 05:45:21 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:21 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:45:21 | INFO | PolicyConfigurationTest | Services | Latest Tag triggered after waiting 0 seconds 05:45:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Has violation true 05:45:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: nginx-1-12-1-with-tag-and-digest 05:45:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: nginx-latest 05:45:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify name violations with same ID as existing image are still triggered PASSED PolicyConfigurationTest > Verify lastUpdated field is updated correctly for policy - ROX-3971 production bug STANDARD_OUT 05:45:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify lastUpdated field is updated correctly for policy - ROX-3971 production bug 05:45:23 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify lastUpdated field is updated correctly for policy - ROX-3971 production bug PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Image Tag can be triggered STANDARD_OUT 05:45:23 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Image Tag can be triggered 05:45:23 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:26 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:26 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:45:26 | INFO | PolicyConfigurationTest | Services | TestImageTagPolicy triggered after waiting 3 seconds 05:45:26 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Image Tag can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Image Remote can be triggered STANDARD_OUT 05:45:26 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Image Remote can be triggered 05:45:27 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:30 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:30 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:45:30 | INFO | PolicyConfigurationTest | Services | TestImageRemotePolicy triggered after waiting 3 seconds 05:45:30 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Image Remote can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Days since image was created can be triggered STANDARD_OUT 05:45:30 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Days since image was created can be triggered 05:45:30 | ERROR | PolicyConfigurationTest | PolicyService | error deleting policy java.lang.NullPointerException: null at io.stackrox.proto.api.v1.Common$ResourceByID$Builder.setId(Common.java:457) at services.PolicyService.deletePolicy(PolicyService.groovy:55) [2 skipped] at PolicyConfigurationTest.$spock_feature_1_2(PolicyConfigurationTest.groovy:259) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:45:30 | INFO | PolicyConfigurationTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:45:30 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Days since image was created can be triggered SKIPPED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Dockerfile Line can be triggered STANDARD_OUT 05:45:30 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Dockerfile Line can be triggered 05:45:30 | ERROR | PolicyConfigurationTest | PolicyService | error deleting policy java.lang.NullPointerException: null at io.stackrox.proto.api.v1.Common$ResourceByID$Builder.setId(Common.java:457) at services.PolicyService.deletePolicy(PolicyService.groovy:55) [1 skipped] at PolicyConfigurationTest.$spock_feature_1_2(PolicyConfigurationTest.groovy:259) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:45:30 | INFO | PolicyConfigurationTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:45:30 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Dockerfile Line can be triggered SKIPPED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration CVE is available can be triggered STANDARD_OUT 05:45:30 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration CVE is available can be triggered 05:45:30 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Deleting image quay.io/rhacs-eng/qa-multi-arch:nginx-1.12@sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728 from DB 05:45:30 | DEBUG | PolicyConfigurationTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa-multi-arch:nginx-1.12@sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728 05:45:30 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:33 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:33 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:45:33 | INFO | PolicyConfigurationTest | Services | TestCVEPolicy triggered after waiting 3 seconds 05:45:33 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration CVE is available can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Port can be triggered STANDARD_OUT 05:45:33 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Port can be triggered 05:45:33 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:36 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:36 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:45:36 | INFO | PolicyConfigurationTest | Services | TestPortPolicy triggered after waiting 3 seconds 05:45:36 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Port can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Port Exposure through Load Balancer can be triggered STANDARD_OUT 05:45:36 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Port Exposure through Load Balancer can be triggered 05:45:36 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:39 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:39 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:45:39 | INFO | PolicyConfigurationTest | Services | TestPortExposurePolicy triggered after waiting 3 seconds 05:45:39 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Port Exposure through Load Balancer can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Port Exposure by Node Port can be triggered STANDARD_OUT 05:45:39 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Port Exposure by Node Port can be triggered 05:45:39 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:39 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:45:39 | INFO | PolicyConfigurationTest | Services | TestPortExposurePolicy triggered after waiting 0 seconds 05:45:40 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Port Exposure by Node Port can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Required Label can be triggered STANDARD_OUT 05:45:40 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Required Label can be triggered 05:45:40 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:43 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:43 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:45:43 | INFO | PolicyConfigurationTest | Services | TestLabelPolicy triggered after waiting 3 seconds 05:45:43 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Required Label can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Required Annotations can be triggered STANDARD_OUT 05:45:43 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Required Annotations can be triggered 05:45:43 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:46 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:46 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:45:46 | INFO | PolicyConfigurationTest | Services | TestAnnotationPolicy triggered after waiting 3 seconds 05:45:46 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Required Annotations can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Environment Variable is available can be triggered STANDARD_OUT 05:45:46 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Environment Variable is available can be triggered 05:45:46 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:49 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:49 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:45:49 | INFO | PolicyConfigurationTest | Services | TestEnvironmentPolicy triggered after waiting 3 seconds 05:45:49 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Environment Variable is available can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Container Port can be triggered STANDARD_OUT 05:45:49 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Container Port can be triggered 05:45:49 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:52 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:52 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:45:52 | INFO | PolicyConfigurationTest | Services | TestContainerPortPolicy triggered after waiting 3 seconds 05:45:52 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Container Port can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Privileged can be triggered STANDARD_OUT 05:45:52 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Privileged can be triggered 05:45:52 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:56 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:56 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:45:56 | INFO | PolicyConfigurationTest | Services | TestPrivilegedPolicy triggered after waiting 3 seconds 05:45:56 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Privileged can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Protocol can be triggered STANDARD_OUT 05:45:56 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Protocol can be triggered 05:45:56 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:59 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:59 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:45:59 | INFO | PolicyConfigurationTest | Services | TestProtocolPolicy triggered after waiting 3 seconds 05:45:59 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Protocol can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Protocol (case-insensitive) can be triggered STANDARD_OUT 05:45:59 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Protocol (case-insensitive) can be triggered 05:45:59 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:45:59 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:45:59 | INFO | PolicyConfigurationTest | Services | TestProtocolPolicy triggered after waiting 0 seconds 05:45:59 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Protocol (case-insensitive) can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Limits can be triggered STANDARD_OUT 05:45:59 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Limits can be triggered 05:45:59 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:02 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:02 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:46:02 | INFO | PolicyConfigurationTest | Services | TestLimitsPolicy triggered after waiting 3 seconds 05:46:02 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Limits can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Requests can be triggered STANDARD_OUT 05:46:02 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Requests can be triggered 05:46:02 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:05 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:05 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:46:05 | INFO | PolicyConfigurationTest | Services | TestRequestsPolicy triggered after waiting 3 seconds 05:46:05 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Requests can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration VolumeName can be triggered STANDARD_OUT 05:46:05 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration VolumeName can be triggered 05:46:06 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:09 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:09 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:46:09 | INFO | PolicyConfigurationTest | Services | TestVolumeNamePolicy triggered after waiting 3 seconds 05:46:09 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration VolumeName can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration HostMount Writable Volume can be triggered STANDARD_OUT 05:46:09 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration HostMount Writable Volume can be triggered 05:46:09 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:12 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:12 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:46:12 | INFO | PolicyConfigurationTest | Services | TestwritableHostmountPolicy triggered after waiting 3 seconds 05:46:12 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration HostMount Writable Volume can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Writable Volume can be triggered STANDARD_OUT 05:46:12 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Writable Volume can be triggered 05:46:12 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:15 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:15 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:46:15 | INFO | PolicyConfigurationTest | Services | TestWritableVolumePolicy triggered after waiting 3 seconds 05:46:15 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Writable Volume can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration RBAC API access can be triggered STANDARD_OUT 05:46:15 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration RBAC API access can be triggered 05:46:15 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:18 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:18 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:46:18 | INFO | PolicyConfigurationTest | Services | Test RBAC API Access Policy triggered after waiting 3 seconds 05:46:18 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration RBAC API access can be triggered PASSED PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source SECRET_KEY fails validation STANDARD_OUT 05:46:18 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify env var policy configuration for source SECRET_KEY fails validation 05:46:18 | ERROR | PolicyConfigurationTest | PolicyService | error creating new policy io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid error: error validating lifecycle stage error: policy configuration is invalid for deploy time: policy validation error: validation of section "" error: policy criteria "Environment Variable" has invalid value[0]="KEY=VALUE" must match regex "((?m)^(?i:(UNSET|RAW|UNKNOWN|^)=([^=]*)=.*)|((SECRET_KEY|CONFIG_MAP_KEY|FIELD|RESOURCE_FIELD)=([^=]*)=$)$)": invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.postPolicy(PolicyServiceGrpc.java:1022) [3 skipped] at services.PolicyService.createNewPolicy(PolicyService.groovy:31) [1 skipped] at PolicyConfigurationTest.$spock_feature_1_3(PolicyConfigurationTest.groovy:714) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:46:18 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source SECRET_KEY fails validation PASSED PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source CONFIG_MAP_KEY fails validation STANDARD_OUT 05:46:18 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify env var policy configuration for source CONFIG_MAP_KEY fails validation 05:46:18 | ERROR | PolicyConfigurationTest | PolicyService | error creating new policy io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid error: error validating lifecycle stage error: policy configuration is invalid for deploy time: policy validation error: validation of section "" error: policy criteria "Environment Variable" has invalid value[0]="KEY=VALUE" must match regex "((?m)^(?i:(UNSET|RAW|UNKNOWN|^)=([^=]*)=.*)|((SECRET_KEY|CONFIG_MAP_KEY|FIELD|RESOURCE_FIELD)=([^=]*)=$)$)": invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.postPolicy(PolicyServiceGrpc.java:1022) [3 skipped] at services.PolicyService.createNewPolicy(PolicyService.groovy:31) [1 skipped] at PolicyConfigurationTest.$spock_feature_1_3(PolicyConfigurationTest.groovy:714) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:46:18 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source CONFIG_MAP_KEY fails validation PASSED PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source FIELD fails validation STANDARD_OUT 05:46:18 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify env var policy configuration for source FIELD fails validation 05:46:18 | ERROR | PolicyConfigurationTest | PolicyService | error creating new policy io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid error: error validating lifecycle stage error: policy configuration is invalid for deploy time: policy validation error: validation of section "" error: policy criteria "Environment Variable" has invalid value[0]="KEY=VALUE" must match regex "((?m)^(?i:(UNSET|RAW|UNKNOWN|^)=([^=]*)=.*)|((SECRET_KEY|CONFIG_MAP_KEY|FIELD|RESOURCE_FIELD)=([^=]*)=$)$)": invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.postPolicy(PolicyServiceGrpc.java:1022) [3 skipped] at services.PolicyService.createNewPolicy(PolicyService.groovy:31) [1 skipped] at PolicyConfigurationTest.$spock_feature_1_3(PolicyConfigurationTest.groovy:714) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:46:18 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source FIELD fails validation PASSED PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source RESOURCE_FIELD fails validation STANDARD_OUT 05:46:18 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify env var policy configuration for source RESOURCE_FIELD fails validation 05:46:18 | ERROR | PolicyConfigurationTest | PolicyService | error creating new policy io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid error: error validating lifecycle stage error: policy configuration is invalid for deploy time: policy validation error: validation of section "" error: policy criteria "Environment Variable" has invalid value[0]="KEY=VALUE" must match regex "((?m)^(?i:(UNSET|RAW|UNKNOWN|^)=([^=]*)=.*)|((SECRET_KEY|CONFIG_MAP_KEY|FIELD|RESOURCE_FIELD)=([^=]*)=$)$)": invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.postPolicy(PolicyServiceGrpc.java:1022) [3 skipped] at services.PolicyService.createNewPolicy(PolicyService.groovy:31) [1 skipped] at PolicyConfigurationTest.$spock_feature_1_3(PolicyConfigurationTest.groovy:714) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:46:18 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source RESOURCE_FIELD fails validation PASSED PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: LabelScope STANDARD_OUT 05:46:18 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy scopes are triggered appropriately: LabelScope 05:46:19 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace label-scope-violation 05:46:19 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace label-scope-non-violation 05:46:19 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:22 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:22 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:46:22 | INFO | PolicyConfigurationTest | Services | Test Label Scope triggered after waiting 3 seconds 05:46:22 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:25 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:25 | INFO | PolicyConfigurationTest | Services | Failed to trigger Test Label Scope after waiting 3 seconds 05:46:25 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: label-scope-violation 05:46:25 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: label-scope-non-violation 05:46:25 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: LabelScope PASSED PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: NamespaceScope STANDARD_OUT 05:46:25 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy scopes are triggered appropriately: NamespaceScope 05:46:25 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace namespace-scope-violation 05:46:25 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace namespace-scope-non-violation 05:46:25 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:28 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:28 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:46:28 | INFO | PolicyConfigurationTest | Services | Test Namespace Scope triggered after waiting 3 seconds 05:46:28 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:31 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:31 | INFO | PolicyConfigurationTest | Services | Failed to trigger Test Namespace Scope after waiting 3 seconds 05:46:31 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: namespace-scope-violation 05:46:31 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: namespace-scope-non-violation 05:46:31 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: NamespaceScope PASSED PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: ClusterNamespaceLabelScope STANDARD_OUT 05:46:31 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy scopes are triggered appropriately: ClusterNamespaceLabelScope 05:46:31 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace all-scope-violation 05:46:31 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace all-scope-non-violation 05:46:31 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:34 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:34 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:46:34 | INFO | PolicyConfigurationTest | Services | Test All Scopes in One triggered after waiting 3 seconds 05:46:34 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:37 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:37 | INFO | PolicyConfigurationTest | Services | Failed to trigger Test All Scopes in One after waiting 3 seconds 05:46:37 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: all-scope-violation 05:46:37 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: all-scope-non-violation 05:46:37 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: ClusterNamespaceLabelScope PASSED PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: MultipleScopes STANDARD_OUT 05:46:37 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy scopes are triggered appropriately: MultipleScopes 05:46:38 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace multiple-scope-violation 05:46:38 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace multiple-scope-violation2 05:46:38 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace multiple-scope-non-violation 05:46:38 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:41 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:41 | INFO | PolicyConfigurationTest | Services | violation size is: 2 05:46:41 | INFO | PolicyConfigurationTest | Services | Test Multiple Scopes triggered after waiting 3 seconds 05:46:41 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:41 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:46:41 | INFO | PolicyConfigurationTest | Services | Test Multiple Scopes triggered after waiting 0 seconds 05:46:41 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:44 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:46:44 | INFO | PolicyConfigurationTest | Services | Failed to trigger Test Multiple Scopes after waiting 3 seconds 05:46:44 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: multiple-scope-violation 05:46:44 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: multiple-scope-violation2 05:46:44 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: multiple-scope-non-violation 05:46:44 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: MultipleScopes PASSED PolicyConfigurationTest > Verify dryRun on a disabled policy generates violations for matching deployments STANDARD_OUT 05:46:44 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify dryRun on a disabled policy generates violations for matching deployments 05:46:46 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify dryRun on a disabled policy generates violations for matching deployments PASSED PolicyConfigurationTest STANDARD_OUT 05:46:46 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: deploymentnginx 05:46:46 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: qadefpolstruts 05:46:46 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: qaapachedns 05:46:46 | DEBUG | PolicyConfigurationTest | Kubernetes | deploymentnginx-lb: Service deleting... 05:46:46 | DEBUG | PolicyConfigurationTest | Kubernetes | deploymentnginx-lb: Service deleted 05:46:46 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: deploymentnginx-lb 05:46:46 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: deploymentnginx-np 05:46:46 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: deployment-rbac 05:46:46 | DEBUG | PolicyConfigurationTest | Kubernetes | deploymentnginx-np: Service deleting... 05:46:46 | DEBUG | PolicyConfigurationTest | Kubernetes | deploymentnginx-np: Service deleted 05:46:47 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testsuite 05:46:47 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Checking if cluster is healthy after test 05:46:47 | DEBUG | PolicyConfigurationTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ProcessVisualizationReplicaTest STANDARD_OUT 05:46:47 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Starting testsuite 05:46:47 | DEBUG | ProcessVisualizationRepli | OpenShift | Namespace qa already exists 05:46:47 | DEBUG | ProcessVisualizationRepli | Kubernetes | Told the orchestrator to createOrReplace apacheserverdeployment 05:46:47 | DEBUG | ProcessVisualizationRepli | OpenShift | Namespace qa already exists 05:46:47 | DEBUG | ProcessVisualizationRepli | Kubernetes | Told the orchestrator to createOrReplace mongodeployment 05:46:47 | DEBUG | ProcessVisualizationRepli | Kubernetes | Waiting for apacheserverdeployment to start 05:46:47 | DEBUG | ProcessVisualizationRepli | Kubernetes | Status of apacheserverdeployment's pods: 05:46:47 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-57v6w Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:46:47 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-5dbj4 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:46:47 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-ktrzf Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:46:47 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-x8dbs Container status: [] 05:46:47 | DEBUG | ProcessVisualizationRepli | Kubernetes | 0/4 are in the ready state for apacheserverdeployment 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | Waiting for apacheserverdeployment to start 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | Status of apacheserverdeployment's pods: 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-57v6w Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:46:48Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-5dbj4 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:46:47Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-ktrzf Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:46:47Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-x8dbs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:46:48Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | All 4 replicas found in ready state for apacheserverdeployment 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | Took 3 seconds for k8s deployment apacheserverdeployment 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | Updating deployment apacheserverdeployment with 4 pods 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | Waiting for mongodeployment to start 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | Status of mongodeployment's pods: 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | - mongodeployment-869849564b-sw9j5 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:46:48Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | - mongodeployment-869849564b-tzncs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:46:48Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | - mongodeployment-869849564b-vqtzl Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:46:48Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | - mongodeployment-869849564b-wq2jv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:46:48Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | All 4 replicas found in ready state for mongodeployment 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | Took 0 seconds for k8s deployment mongodeployment 05:46:50 | DEBUG | ProcessVisualizationRepli | Kubernetes | Updating deployment mongodeployment with 4 pods 05:46:50 | INFO | ProcessVisualizationRepli | Services | SR found deployment apacheserverdeployment within 0s 05:46:50 | INFO | ProcessVisualizationRepli | Services | SR found deployment mongodeployment within 0s ProcessVisualizationReplicaTest > Verify process visualization with replicas on #depName > Verify process visualization with replicas on apacheserverdeployment STANDARD_OUT 05:46:50 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Starting testcase: Verify process visualization with replicas on apacheserverdeployment 05:46:50 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:46:50 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:46:50 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Didn't find all the expected processes, retrying... 05:46:55 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:46:55 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:46:55 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Didn't find all the expected processes, retrying... 05:47:00 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:00 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:00 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Didn't find all the expected processes, retrying... 05:47:05 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:05 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:05 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Didn't find all the expected processes, retrying... 05:47:10 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:10 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:10 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | ProcessVisualizationTest: Dep: apacheserverdeployment Processes: [/usr/sbin/apache2, /usr/bin/tail, /bin/chown, /run.sh] 05:47:10 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:10 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | [/usr/bin/tail:[4baa9c321e6c, a828c3bf25ee, 48faf51c9987, 3c05aa7b5cff], /bin/chown:[4baa9c321e6c, a828c3bf25ee, 48faf51c9987, 3c05aa7b5cff], /usr/sbin/apache2:[48faf51c9987, a828c3bf25ee, 4baa9c321e6c, 3c05aa7b5cff], /run.sh:[48faf51c9987, a828c3bf25ee, 4baa9c321e6c, 3c05aa7b5cff]] 05:47:10 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Ending testcase ProcessVisualizationReplicaTest > Verify process visualization with replicas on #depName > Verify process visualization with replicas on apacheserverdeployment PASSED ProcessVisualizationReplicaTest > Verify process visualization with replicas on #depName > Verify process visualization with replicas on mongodeployment STANDARD_OUT 05:47:10 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Starting testcase: Verify process visualization with replicas on mongodeployment 05:47:10 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:10 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:10 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | ProcessVisualizationTest: Dep: mongodeployment Processes: [/bin/rm, /usr/bin/mongod, /usr/local/bin/docker-entrypoint.sh, /usr/bin/id, /usr/bin/numactl, /usr/bin/find, /bin/true, /bin/chown, /usr/local/bin/gosu] 05:47:10 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:10 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | [/usr/bin/id:[38065da5194f, fc30a35b6475, 56347a5c4b7a, 14be741db73c], /usr/local/bin/docker-entrypoint.sh:[fc30a35b6475, 38065da5194f, 56347a5c4b7a, 14be741db73c], /usr/bin/mongod:[38065da5194f, fc30a35b6475, 56347a5c4b7a, 14be741db73c], /usr/bin/numactl:[56347a5c4b7a, 56347a5c4b7a, 38065da5194f, 38065da5194f, fc30a35b6475, fc30a35b6475, 14be741db73c, 14be741db73c]] 05:47:10 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Ending testcase ProcessVisualizationReplicaTest > Verify process visualization with replicas on #depName > Verify process visualization with replicas on mongodeployment PASSED ProcessVisualizationReplicaTest STANDARD_OUT 05:47:10 | DEBUG | ProcessVisualizationRepli | Kubernetes | Removed the deployment: apacheserverdeployment 05:47:10 | DEBUG | ProcessVisualizationRepli | Kubernetes | Removed the deployment: mongodeployment 05:47:10 | INFO | ProcessVisualizationRepli | Services | SR does not detect the deployment apacheserverdeployment yet: io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id '6138b77a-ed39-4e03-949c-682a9409d0ac' does not exist: not found 05:47:11 | INFO | ProcessVisualizationRepli | Services | SR does not detect the deployment mongodeployment yet: io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id '10792036-1749-4bb2-a923-84895a21a469' does not exist: not found 05:47:11 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Ending testsuite 05:47:11 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Checking if cluster is healthy after test 05:47:11 | DEBUG | ProcessVisualizationRepli | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ProcessVisualizationTest STANDARD_OUT 05:47:11 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testsuite 05:47:11 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:47:11 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace qanginx 05:47:11 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:47:11 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace qastruts 05:47:11 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:47:11 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace centosdeployment 05:47:11 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:47:11 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace fedoradeployment 05:47:11 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:47:11 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace elasticdeployment 05:47:11 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:47:11 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace mongodeployment 05:47:11 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:47:11 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace rox4751deployment 05:47:11 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:47:11 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace rox4979deployment 05:47:11 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for qanginx to start 05:47:11 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of qanginx's pods: 05:47:11 | DEBUG | ProcessVisualizationTest | Kubernetes | - qanginx-77c6fcc994-fkzxp Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:47:11 | DEBUG | ProcessVisualizationTest | Kubernetes | 0/1 are in the ready state for qanginx 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for qanginx to start 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of qanginx's pods: 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | - qanginx-77c6fcc994-fkzxp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:47:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for qanginx 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 3 seconds for k8s deployment qanginx 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment qanginx with 1 pods 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for qastruts to start 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of qastruts's pods: 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | - qastruts-868b56784f-zpn9q Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:47:11Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for qastruts 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment qastruts 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment qastruts with 1 pods 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for centosdeployment to start 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of centosdeployment's pods: 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | - centosdeployment-676fb6c7d9-mpk9n Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:47:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for centosdeployment 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment centosdeployment 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment centosdeployment with 1 pods 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for fedoradeployment to start 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of fedoradeployment's pods: 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | - fedoradeployment-54d757d899-bp7dj Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:47:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for fedoradeployment 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment fedoradeployment 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment fedoradeployment with 1 pods 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for elasticdeployment to start 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of elasticdeployment's pods: 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | - elasticdeployment-56564dc9cd-44h62 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:47:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for elasticdeployment 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment elasticdeployment 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment elasticdeployment with 1 pods 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for mongodeployment to start 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of mongodeployment's pods: 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | - mongodeployment-869849564b-n9n26 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:47:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for mongodeployment 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment mongodeployment 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment mongodeployment with 1 pods 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for rox4751deployment to start 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of rox4751deployment's pods: 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | - rox4751deployment-6dd7655d78-gsb7m Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:47:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for rox4751deployment 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment rox4751deployment 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment rox4751deployment with 1 pods 05:47:14 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for rox4979deployment to start 05:47:15 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of rox4979deployment's pods: 05:47:15 | DEBUG | ProcessVisualizationTest | Kubernetes | - rox4979deployment-6b8659fbb-9c2zs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:47:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:47:15 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for rox4979deployment 05:47:15 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment rox4979deployment 05:47:15 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment rox4979deployment with 1 pods 05:47:15 | INFO | ProcessVisualizationTest | Services | SR found deployment qanginx within 0s 05:47:15 | INFO | ProcessVisualizationTest | Services | SR found deployment qastruts within 0s 05:47:15 | INFO | ProcessVisualizationTest | Services | SR found deployment centosdeployment within 0s 05:47:15 | INFO | ProcessVisualizationTest | Services | SR found deployment fedoradeployment within 0s 05:47:15 | INFO | ProcessVisualizationTest | Services | SR found deployment elasticdeployment within 0s 05:47:15 | INFO | ProcessVisualizationTest | Services | SR found deployment mongodeployment within 0s 05:47:15 | INFO | ProcessVisualizationTest | Services | SR found deployment rox4751deployment within 0s 05:47:15 | INFO | ProcessVisualizationTest | Services | SR found deployment rox4979deployment within 0s ProcessVisualizationTest > Verify process visualization on kube-proxy STANDARD_OUT 05:47:15 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on kube-proxy 05:47:15 | INFO | ProcessVisualizationTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:47:15 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on kube-proxy SKIPPED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: qanginx STANDARD_OUT 05:47:15 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: qanginx 05:47:15 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:15 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Didn't find all the expected processes, retrying... 05:47:20 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:20 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Didn't find all the expected processes, retrying... 05:47:25 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:25 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Didn't find all the expected processes, retrying... 05:47:30 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:30 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Didn't find all the expected processes, retrying... 05:47:35 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:35 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Didn't find all the expected processes, retrying... 05:47:40 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Didn't find all the expected processes, retrying... 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: qanginx Processes: [/usr/sbin/nginx] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: qanginx PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: qastruts STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: qastruts 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: qastruts Processes: [/opt/java/openjdk/bin/java, /usr/local/tomcat/bin/catalina.sh, /usr/bin/uname, /usr/bin/bash, /usr/bin/dirname] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: qastruts PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: centosdeployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: centosdeployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: centosdeployment Processes: [/bin/sh, /bin/sleep] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: centosdeployment PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: fedoradeployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: fedoradeployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: fedoradeployment Processes: [/bin/sleep, /bin/sh] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: fedoradeployment PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: elasticdeployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: elasticdeployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: elasticdeployment Processes: [/sbin/ldconfig, /usr/bin/egrep, /usr/bin/grep, /usr/bin/tr, /usr/bin/cut, /bin/java, /usr/share/elasticsearch/bin/elasticsearch, /usr/bin/sh, /usr/bin/hostname, /usr/bin/dirname] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: elasticdeployment PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: mongodeployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: mongodeployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: mongodeployment Processes: [/usr/bin/id, /usr/bin/mongod, /bin/true, /bin/rm, /usr/bin/numactl, /usr/local/bin/gosu, /bin/chown, /usr/local/bin/docker-entrypoint.sh, /usr/bin/find] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: mongodeployment PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: rox4751deployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: rox4751deployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: rox4751deployment Processes: [/usr/bin/sleep, /usr/bin/date, /test/bin/exec.sh] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: rox4751deployment PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: rox4979deployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: rox4979deployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: rox4979deployment Processes: [/bin/sleep, /qa/exec.sh] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: rox4979deployment PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on qanginx STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on qanginx 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: qanginx Processes and UIDs: [/usr/sbin/nginx:[[0, 0]]] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on qanginx PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on qastruts STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on qastruts 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: qastruts Processes and UIDs: [/opt/java/openjdk/bin/java:[[0, 0]], /usr/local/tomcat/bin/catalina.sh:[[0, 0]], /usr/bin/uname:[[0, 0]], /usr/bin/bash:[[0, 0]], /usr/bin/dirname:[[0, 0]]] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on qastruts PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on centosdeployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on centosdeployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: centosdeployment Processes and UIDs: [/bin/sh:[[0, 0]], /bin/sleep:[[0, 0]]] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on centosdeployment PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on fedoradeployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on fedoradeployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: fedoradeployment Processes and UIDs: [/bin/sleep:[[0, 0]], /bin/sh:[[0, 0]]] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on fedoradeployment PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on elasticdeployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on elasticdeployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: elasticdeployment Processes and UIDs: [/sbin/ldconfig:[[1000, 1000]], /usr/bin/egrep:[[1000, 1000]], /usr/bin/grep:[[1000, 1000]], /usr/bin/tr:[[1000, 1000]], /usr/bin/cut:[[1000, 1000]], /bin/java:[[1000, 1000]], /usr/share/elasticsearch/bin/elasticsearch:[[1000, 1000]], /usr/bin/sh:[[1000, 1000]], /usr/bin/hostname:[[1000, 1000]], /usr/bin/dirname:[[1000, 1000]]] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on elasticdeployment PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on rox4751deployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on rox4751deployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: rox4751deployment Processes and UIDs: [/usr/bin/sleep:[[0, 0]], /usr/bin/date:[[0, 0]], /test/bin/exec.sh:[[0, 0]]] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on rox4751deployment PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on rox4979deployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on rox4979deployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: rox4979deployment Processes and UIDs: [/bin/sleep:[[9001, 9000]], /qa/exec.sh:[[9001, 9000]]] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on rox4979deployment PASSED ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on qanginx STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process arguments on qanginx 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: qanginx Processes: [[/usr/sbin/nginx, -g daemon off;]] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on qanginx PASSED ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on centosdeployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process arguments on centosdeployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: centosdeployment Processes: [[/bin/sh, -c /bin/sleep 600], [/bin/sleep, --coreutils-prog-shebang=sleep /bin/sleep 600]] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on centosdeployment PASSED ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on fedoradeployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process arguments on fedoradeployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: fedoradeployment Processes: [[/bin/sleep, 600], [/bin/sh, -c /bin/sleep 600]] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on fedoradeployment PASSED ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on elasticdeployment STANDARD_OUT 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process arguments on elasticdeployment 05:47:45 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: elasticdeployment Processes: [[/sbin/ldconfig, -p], [/usr/bin/egrep, /usr/bin/egrep -- (^-d |-d$| -d |--daemonize$|--daemonize )], [/usr/bin/grep, project.name], [/usr/bin/tr, \n ], [/usr/bin/cut, -d. -f1], [/bin/java, -XX:+UseConcMarkSweepGC -XX:CMSInitiatingOccupancyFraction=75 -XX:+UseCMSInitiatingOccupancyOnly -XX:+AlwaysPreTouch -server -Xss1m -Djava.awt.headless=true -Dfile.encoding=UTF-8 -Djna.nosys=true -Djdk.io.permissionsUseCanonicalPath=true -Dio.netty.noUnsafe=true -Dio.netty.noKeySetOptimization=true -Dio.netty.recycler.maxCapacityPerThread=0 -Dlog4j.shutdownHookEnabled=false -Dlog4j2.disable.jmx=true -Dlog4j.skipJansi=true -XX:+HeapDumpOnOutOfMemoryError -XX:+UnlockExperimentalVMOptions -XX:+UseCGroupMemoryLimitForHeap -XX:MaxRAMFraction=2 -XX:InitialRAMFraction=2 -XX:MinRAMFraction=2 -Des.path.home=/usr/share/elasticsearch -cp /usr/share/elasticsearch/lib/* org.elasticsearch.bootstrap.Elasticsearch -Epath.conf=/etc/elasticsearch], [/bin/java, -cp /usr/share/elasticsearch/lib/* org.elasticsearch.tools.JavaVersionChecker], [/usr/share/elasticsearch/bin/elasticsearch, /usr/share/elasticsearch/bin/elasticsearch -Epath.conf=/etc/elasticsearch], [/usr/bin/grep, -E -- (^-d |-d$| -d |--daemonize$|--daemonize )], [/usr/bin/grep, ^- /etc/elasticsearch/jvm.options], [/usr/bin/sh, -c ${ES_HOME}/bin/elasticsearch -Epath.conf=${ES_CONF}], [/usr/bin/hostname, ], [/usr/bin/dirname, /usr/share/elasticsearch/bin/elasticsearch]] 05:47:45 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on elasticdeployment PASSED ProcessVisualizationTest STANDARD_OUT 05:47:45 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: qanginx 05:47:45 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: qastruts 05:47:45 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: centosdeployment 05:47:45 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: fedoradeployment 05:47:45 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: elasticdeployment 05:47:46 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: mongodeployment 05:47:46 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: rox4751deployment 05:47:46 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: rox4979deployment 05:47:46 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testsuite 05:47:46 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Checking if cluster is healthy after test 05:47:46 | DEBUG | ProcessVisualizationTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries RbacAuthTest STANDARD_OUT 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Starting testsuite RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [:] STANDARD_OUT 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Starting testcase: Verify RBAC with Role/Token combinations: [:] 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Created Role: name: "Automation Role0b2dc509-e18e-4058-9e55-a6e9f56fe401" permission_set_id: "cde74ad6-8662-48f4-9915-705a07ed7523" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Testing read function for Cluster 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Testing write function for Cluster 05:47:46 | INFO | RbacAuthTest | RoleService | Deleted role: Automation Role0b2dc509-e18e-4058-9e55-a6e9f56fe401 and permission set 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Ending testcase RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [:] PASSED RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:NO_ACCESS] STANDARD_OUT 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Starting testcase: Verify RBAC with Role/Token combinations: [Cluster:NO_ACCESS] 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Created Role: name: "Automation Rolede6d0632-0227-4510-a26c-07afacf20ef6" permission_set_id: "20108fbd-ae05-43cf-8168-d8a5498e50ae" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Testing read function for Cluster 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Testing write function for Cluster 05:47:46 | INFO | RbacAuthTest | RoleService | Deleted role: Automation Rolede6d0632-0227-4510-a26c-07afacf20ef6 and permission set 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Ending testcase RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:NO_ACCESS] PASSED RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS] STANDARD_OUT 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Starting testcase: Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS] 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Created Role: name: "Automation Role713e9ab8-a67d-41cd-9741-f3c54fa3041b" permission_set_id: "3e66e536-459c-49b3-8ddb-43029ccf41ba" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Testing read function for Cluster 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Testing write function for Cluster 05:47:46 | INFO | RbacAuthTest | RoleService | Deleted role: Automation Role713e9ab8-a67d-41cd-9741-f3c54fa3041b and permission set 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Ending testcase RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS] PASSED RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_WRITE_ACCESS] STANDARD_OUT 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Starting testcase: Verify RBAC with Role/Token combinations: [Cluster:READ_WRITE_ACCESS] 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Created Role: name: "Automation Role87d10384-3913-4d59-9cbb-8160fa882c43" permission_set_id: "db7a2826-a8af-4850-84f4-9db007b684c6" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Testing read function for Cluster 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Testing write function for Cluster 05:47:46 | INFO | RbacAuthTest | RoleService | Deleted role: Automation Role87d10384-3913-4d59-9cbb-8160fa882c43 and permission set 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Ending testcase RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_WRITE_ACCESS] PASSED RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS, Deployment:READ_ACCESS, NetworkGraph:READ_ACCESS, NetworkPolicy:READ_ACCESS] STANDARD_OUT 05:47:46 | INFO | RbacAuthTest | RbacAuthTest | Starting testcase: Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS, Deployment:READ_ACCESS, NetworkGraph:READ_ACCESS, NetworkPolicy:READ_ACCESS] 05:47:47 | INFO | RbacAuthTest | RbacAuthTest | Created Role: name: "Automation Role0caac20f-a530-4c67-8b9f-9f6838a68581" permission_set_id: "6bcfb940-bf3c-4654-9cd0-991dfb82f084" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 05:47:47 | INFO | RbacAuthTest | RbacAuthTest | Testing read function for NetworkPolicy 05:47:47 | INFO | RbacAuthTest | RbacAuthTest | Testing write function for NetworkPolicy 05:47:47 | INFO | RbacAuthTest | RoleService | Deleted role: Automation Role0caac20f-a530-4c67-8b9f-9f6838a68581 and permission set 05:47:47 | INFO | RbacAuthTest | RbacAuthTest | Ending testcase RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS, Deployment:READ_ACCESS, NetworkGraph:READ_ACCESS, NetworkPolicy:READ_ACCESS] PASSED RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS, Deployment:READ_ACCESS, NetworkGraph:READ_ACCESS, NetworkPolicy:READ_WRITE_ACCESS] STANDARD_OUT 05:47:47 | INFO | RbacAuthTest | RbacAuthTest | Starting testcase: Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS, Deployment:READ_ACCESS, NetworkGraph:READ_ACCESS, NetworkPolicy:READ_WRITE_ACCESS] 05:47:47 | INFO | RbacAuthTest | RbacAuthTest | Created Role: name: "Automation Rolee8b83b2c-e8fb-4297-a0fd-40a7fb1b405e" permission_set_id: "972d24ae-309b-4129-814d-f5eb5a24984e" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 05:47:47 | INFO | RbacAuthTest | RbacAuthTest | Testing read function for NetworkPolicy 05:47:47 | INFO | RbacAuthTest | RbacAuthTest | Testing write function for NetworkPolicy 05:47:47 | INFO | RbacAuthTest | RoleService | Deleted role: Automation Rolee8b83b2c-e8fb-4297-a0fd-40a7fb1b405e and permission set 05:47:47 | INFO | RbacAuthTest | RbacAuthTest | Ending testcase RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS, Deployment:READ_ACCESS, NetworkGraph:READ_ACCESS, NetworkPolicy:READ_WRITE_ACCESS] PASSED RbacAuthTest STANDARD_OUT 05:47:47 | INFO | RbacAuthTest | RbacAuthTest | Ending testsuite 05:47:47 | INFO | RbacAuthTest | RbacAuthTest | Checking if cluster is healthy after test 05:47:47 | DEBUG | RbacAuthTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries RetryTest > test STANDARD_OUT 05:47:47 | DEBUG | | Helpers | Calling RetryTest.fail with 3 retries 05:47:47 | DEBUG | | Helpers | Caught exception. Retrying in 0s (attempt 0 of 3): Condition not satisfied: i++ > 2 | | 0 false I was called 0 times 05:47:47 | DEBUG | | Helpers | Caught exception. Retrying in 0s (attempt 1 of 3): Condition not satisfied: i++ > 2 | | 1 false I was called 1 times 05:47:47 | DEBUG | | Helpers | Caught exception. Retrying in 0s (attempt 2 of 3): Condition not satisfied: i++ > 2 | | 2 false I was called 2 times RetryTest > test PASSED RiskTest STANDARD_OUT 05:47:47 | INFO | RiskTest | RiskTest | Starting testsuite 05:47:47 | INFO | RiskTest | OpenShift | Created namespace qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6 05:47:47 | INFO | RiskTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6 namespace. 05:47:47 | DEBUG | RiskTest | Kubernetes | quay: secret created. 05:47:47 | DEBUG | RiskTest | Kubernetes | default-dockercfg-9g79g: secret created. 05:47:48 | DEBUG | RiskTest | Kubernetes | redhat-image-pull-secret: secret created. 05:47:48 | DEBUG | RiskTest | Kubernetes | public-dockerhub: secret created. 05:47:48 | DEBUG | RiskTest | Kubernetes | gcr-image-pull-secret: secret created. 05:47:48 | DEBUG | RiskTest | OpenShift | Adding system:serviceaccount:qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6:default to anyuid user list 05:47:48 | DEBUG | RiskTest | Kubernetes | Told the orchestrator to createOrReplace risk-deployment-1 05:47:48 | DEBUG | RiskTest | OpenShift | Namespace qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6 already exists 05:47:48 | DEBUG | RiskTest | Kubernetes | Told the orchestrator to createOrReplace risk-deployment-0 05:47:48 | DEBUG | RiskTest | Kubernetes | Waiting for risk-deployment-1 to start 05:47:48 | DEBUG | RiskTest | Kubernetes | Status of risk-deployment-1's pods: 05:47:48 | DEBUG | RiskTest | Kubernetes | - risk-deployment-1-756fbf445b-n7nvp Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:47:48 | DEBUG | RiskTest | Kubernetes | 0/1 are in the ready state for risk-deployment-1 05:47:51 | DEBUG | RiskTest | Kubernetes | Waiting for risk-deployment-1 to start 05:47:51 | DEBUG | RiskTest | Kubernetes | Status of risk-deployment-1's pods: 05:47:51 | DEBUG | RiskTest | Kubernetes | - risk-deployment-1-756fbf445b-n7nvp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:47:49Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:47:51 | DEBUG | RiskTest | Kubernetes | All 1 replicas found in ready state for risk-deployment-1 05:47:51 | DEBUG | RiskTest | Kubernetes | Took 3 seconds for k8s deployment risk-deployment-1 05:47:51 | DEBUG | RiskTest | Kubernetes | Updating deployment risk-deployment-1 with 1 pods 05:47:51 | DEBUG | RiskTest | Kubernetes | Waiting for risk-deployment-0 to start 05:47:51 | DEBUG | RiskTest | Kubernetes | Status of risk-deployment-0's pods: 05:47:51 | DEBUG | RiskTest | Kubernetes | - risk-deployment-0-5d64b5455d-6cfrc Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:47:49Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:47:51 | DEBUG | RiskTest | Kubernetes | All 1 replicas found in ready state for risk-deployment-0 05:47:51 | DEBUG | RiskTest | Kubernetes | Took 0 seconds for k8s deployment risk-deployment-0 05:47:51 | DEBUG | RiskTest | Kubernetes | Updating deployment risk-deployment-0 with 1 pods 05:47:51 | INFO | RiskTest | Services | SR found deployment risk-deployment-1 within 0s 05:47:51 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 0d592ce7-7c37-4198-bd46-e8e8c8636ca7, null within 0s 05:47:51 | INFO | RiskTest | RiskTest | Processes for risk-deployment-1: 05:47:51 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-10-31T05:48:51.507674551Z 05:47:51 | INFO | RiskTest | RiskTest | User lock at none 05:47:51 | INFO | RiskTest | Services | SR found deployment risk-deployment-0 within 0s 05:47:51 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 374e77aa-422b-4c68-8043-7a1cfdfee16a, null within 0s 05:47:51 | INFO | RiskTest | RiskTest | Processes for risk-deployment-0: 05:47:51 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-10-31T05:48:51.544168712Z 05:47:51 | INFO | RiskTest | RiskTest | User lock at none RiskTest > Deployment count == 2 STANDARD_OUT 05:47:51 | INFO | RiskTest | RiskTest | Starting testcase: Deployment count == 2 05:47:51 | INFO | RiskTest | RiskTest | Ending testcase RiskTest > Deployment count == 2 PASSED RiskTest > Risk is the same for equivalent deployments STANDARD_OUT 05:47:51 | INFO | RiskTest | RiskTest | Starting testcase: Risk is the same for equivalent deployments 05:47:51 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 0d592ce7-7c37-4198-bd46-e8e8c8636ca7, null within 0s 05:47:51 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found for risk-deployment-1 05:47:51 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 374e77aa-422b-4c68-8043-7a1cfdfee16a, null within 0s 05:47:51 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found for risk-deployment-0 05:47:51 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found 05:47:56 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 0d592ce7-7c37-4198-bd46-e8e8c8636ca7, null within 0s 05:47:56 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found for risk-deployment-1 05:47:56 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 374e77aa-422b-4c68-8043-7a1cfdfee16a, null within 0s 05:47:56 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found for risk-deployment-0 05:47:56 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found 05:48:01 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 0d592ce7-7c37-4198-bd46-e8e8c8636ca7, null within 0s 05:48:01 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found for risk-deployment-1 05:48:01 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 374e77aa-422b-4c68-8043-7a1cfdfee16a, null within 0s 05:48:01 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found for risk-deployment-0 05:48:01 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found 05:48:06 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 0d592ce7-7c37-4198-bd46-e8e8c8636ca7, null within 0s 05:48:06 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found for risk-deployment-1 05:48:06 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 374e77aa-422b-4c68-8043-7a1cfdfee16a, null within 0s 05:48:06 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found for risk-deployment-0 05:48:06 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found 05:48:11 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 0d592ce7-7c37-4198-bd46-e8e8c8636ca7, null within 0s 05:48:11 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found for risk-deployment-1 05:48:11 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 374e77aa-422b-4c68-8043-7a1cfdfee16a, null within 0s 05:48:11 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found for risk-deployment-0 05:48:11 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found 05:48:16 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 0d592ce7-7c37-4198-bd46-e8e8c8636ca7, null within 0s 05:48:16 | INFO | RiskTest | RiskTest | SR found /bin/sleep for risk-deployment-1 05:48:16 | INFO | RiskTest | RiskTest | SR found /bin/sh for risk-deployment-1 05:48:16 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 374e77aa-422b-4c68-8043-7a1cfdfee16a, null within 0s 05:48:16 | INFO | RiskTest | RiskTest | SR found /bin/sh for risk-deployment-0 05:48:16 | INFO | RiskTest | RiskTest | SR found /bin/sleep for risk-deployment-0 05:48:16 | INFO | RiskTest | RiskTest | ready to test 05:48:16 | INFO | RiskTest | RiskTest | risk-deployment-1 priority 4, anomalous false, status NOT_GENERATED 05:48:16 | INFO | RiskTest | RiskTest | risk-deployment-0 priority 4, anomalous false, status NOT_GENERATED 05:48:17 | INFO | RiskTest | RiskTest | Ending testcase RiskTest > Risk is the same for equivalent deployments PASSED RiskTest > Processes grouped by deployment (GetGroupedProcessByDeploymentAndContainer) SKIPPED RiskTest > Risk priority changes when a process is executed after the discovery phase STANDARD_OUT 05:48:17 | INFO | RiskTest | RiskTest | Starting testcase: Risk priority changes when a process is executed after the discovery phase 05:48:17 | INFO | RiskTest | RiskTest | sleeping for 60 seconds to ensure the discovery phase is over 05:49:17 | DEBUG | RiskTest | Kubernetes | First container in pod risk-deployment-1-756fbf445b-n7nvp is running 05:49:17 | DEBUG | RiskTest | Kubernetes | Exec-ing the following command in pod risk-deployment-1-756fbf445b-n7nvp: [ls] 05:49:17 | DEBUG | | Kubernetes | Command exited with 0 05:49:17 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:49:17 | DEBUG | RiskTest | Kubernetes | Command status: SUCCESS Stdout: bin boot dev etc home lib lib64 media mnt opt proc root run sbin srv sys tmp usr var Stderr: 05:49:17 | INFO | RiskTest | RiskTest | Before: 05:49:17 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status NOT_GENERATED 05:49:17 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 4, anomalous false, status NOT_GENERATED 05:49:17 | INFO | RiskTest | RiskTest | After: 05:49:17 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status NOT_GENERATED 05:49:17 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 4, anomalous false, status NOT_GENERATED 05:49:17 | INFO | RiskTest | RiskTest | Process List: 05:49:17 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:49:17 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/ls, /bin/sh, /bin/sleep 05:49:17 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:49:17 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:49:17 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 0d592ce7-7c37-4198-bd46-e8e8c8636ca7, null within 0s 05:49:17 | INFO | RiskTest | RiskTest | Processes for risk-deployment-1: /bin/sleep,/bin/sh 05:49:17 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-10-31T05:48:51.507674551Z 05:49:17 | INFO | RiskTest | RiskTest | User lock at none 05:49:17 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 374e77aa-422b-4c68-8043-7a1cfdfee16a, null within 0s 05:49:17 | INFO | RiskTest | RiskTest | Processes for risk-deployment-0: /bin/sh,/bin/sleep 05:49:17 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-10-31T05:48:51.544168712Z 05:49:17 | INFO | RiskTest | RiskTest | User lock at none 05:49:17 | INFO | RiskTest | RiskTest | not yet ready to test - there is no change yet to priorities 05:49:22 | INFO | RiskTest | RiskTest | Before: 05:49:22 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status NOT_GENERATED 05:49:22 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 4, anomalous false, status NOT_GENERATED 05:49:22 | INFO | RiskTest | RiskTest | After: 05:49:22 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:49:22 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status NOT_GENERATED 05:49:22 | INFO | RiskTest | RiskTest | Process List: 05:49:22 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:49:22 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/ls, /bin/sh, /bin/sleep 05:49:22 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:49:22 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:49:22 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 0d592ce7-7c37-4198-bd46-e8e8c8636ca7, null within 0s 05:49:22 | INFO | RiskTest | RiskTest | Processes for risk-deployment-1: /bin/sleep,/bin/sh 05:49:22 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-10-31T05:48:51.507674551Z 05:49:22 | INFO | RiskTest | RiskTest | User lock at none 05:49:22 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - c82067c8-51ad-4080-b8e4-2ab4baabf49e, qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6, 374e77aa-422b-4c68-8043-7a1cfdfee16a, null within 0s 05:49:22 | INFO | RiskTest | RiskTest | Processes for risk-deployment-0: /bin/sh,/bin/sleep 05:49:22 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-10-31T05:48:51.544168712Z 05:49:22 | INFO | RiskTest | RiskTest | User lock at none 05:49:22 | INFO | RiskTest | RiskTest | ready to test 05:49:22 | INFO | RiskTest | RiskTest | Ending testcase RiskTest > Risk priority changes when a process is executed after the discovery phase PASSED RiskTest > Risk changes when an anomalous process is added to the baseline STANDARD_OUT 05:49:22 | INFO | RiskTest | RiskTest | Starting testcase: Risk changes when an anomalous process is added to the baseline 05:49:22 | INFO | RiskTest | RiskTest | the process baseline is updated 05:49:22 | INFO | RiskTest | RiskTest | Before: 05:49:22 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:49:22 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status NOT_GENERATED 05:49:22 | INFO | RiskTest | RiskTest | After: 05:49:22 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:49:22 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status NOT_GENERATED 05:49:22 | INFO | RiskTest | RiskTest | Process List: 05:49:22 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:49:22 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/ls, /bin/sh, /bin/sleep 05:49:22 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:49:22 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:49:22 | INFO | RiskTest | RiskTest | not yet ready to test - there is no change yet to risk score 05:49:27 | INFO | RiskTest | RiskTest | Before: 05:49:27 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:49:27 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status NOT_GENERATED 05:49:27 | INFO | RiskTest | RiskTest | After: 05:49:27 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:49:27 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status NOT_GENERATED 05:49:27 | INFO | RiskTest | RiskTest | Process List: 05:49:27 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:49:27 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/ls, /bin/sh, /bin/sleep 05:49:27 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:49:27 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:49:27 | INFO | RiskTest | RiskTest | not yet ready to test - there is no change yet to risk score 05:49:32 | INFO | RiskTest | RiskTest | Before: 05:49:32 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:49:32 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status NOT_GENERATED 05:49:32 | INFO | RiskTest | RiskTest | After: 05:49:32 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:49:32 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status NOT_GENERATED 05:49:32 | INFO | RiskTest | RiskTest | Process List: 05:49:32 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:49:32 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/ls, /bin/sh, /bin/sleep 05:49:32 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:49:32 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:49:32 | INFO | RiskTest | RiskTest | not yet ready to test - there is no change yet to risk score 05:49:37 | INFO | RiskTest | RiskTest | Before: 05:49:37 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:49:37 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status NOT_GENERATED 05:49:37 | INFO | RiskTest | RiskTest | After: 05:49:37 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status LOCKED 05:49:37 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status NOT_GENERATED 05:49:37 | INFO | RiskTest | RiskTest | Process List: 05:49:37 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:49:37 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/ls, /bin/sh, /bin/sleep 05:49:37 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:49:37 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:49:37 | INFO | RiskTest | RiskTest | ready to test 05:49:37 | INFO | RiskTest | RiskTest | Ending testcase RiskTest > Risk changes when an anomalous process is added to the baseline PASSED RiskTest STANDARD_OUT 05:49:37 | DEBUG | RiskTest | Kubernetes | Removed the deployment: risk-deployment-1 05:49:37 | DEBUG | RiskTest | Kubernetes | risk-deployment-1: deployment removed. 05:49:37 | DEBUG | RiskTest | Kubernetes | Removed the deployment: risk-deployment-0 05:49:37 | DEBUG | RiskTest | Kubernetes | risk-deployment-0: deployment removed. 05:49:37 | DEBUG | RiskTest | Kubernetes | Waiting for namespace qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6 to be deleted 05:49:37 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:49:40 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:49:43 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:49:46 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:49:50 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:49:53 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:49:56 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:49:59 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:50:02 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:50:05 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:50:08 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:50:11 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:50:14 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:50:17 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:50:20 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:50:23 | DEBUG | RiskTest | Kubernetes | K8s found that namespace qa-risk-31a16487-067c-408e-b3bb-7b95519d1ec6 was deleted 05:50:23 | INFO | RiskTest | RiskTest | Ending testsuite 05:50:23 | INFO | RiskTest | RiskTest | Checking if cluster is healthy after test 05:50:23 | DEBUG | RiskTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries RoutesTest STANDARD_OUT 05:50:23 | INFO | RoutesTest | RoutesTest | Starting testsuite RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-auto-exposure-cluster-ip, autoExposeAsService: true, exposeAsService: true, loadBalancer: false, #0] STANDARD_OUT 05:50:23 | INFO | RoutesTest | RoutesTest | Starting testcase: Verify that routes are detected correctly [deploymentName: server-auto-exposure-cluster-ip, autoExposeAsService: true, exposeAsService: true, loadBalancer: false, #0] 05:50:23 | DEBUG | RoutesTest | OpenShift | Namespace qa already exists 05:50:23 | DEBUG | RoutesTest | Kubernetes | server-auto-exposure-cluster-ip service created 05:50:23 | DEBUG | RoutesTest | Kubernetes | Told the orchestrator to createOrReplace server-auto-exposure-cluster-ip 05:50:23 | DEBUG | RoutesTest | Kubernetes | Waiting for server-auto-exposure-cluster-ip to start 05:50:23 | DEBUG | RoutesTest | Kubernetes | Status of server-auto-exposure-cluster-ip's pods: 05:50:23 | DEBUG | RoutesTest | Kubernetes | - server-auto-exposure-cluster-ip-987b698bc-v45fv Container status: [] 05:50:23 | DEBUG | RoutesTest | Kubernetes | 0/1 are in the ready state for server-auto-exposure-cluster-ip 05:50:26 | DEBUG | RoutesTest | Kubernetes | Waiting for server-auto-exposure-cluster-ip to start 05:50:26 | DEBUG | RoutesTest | Kubernetes | Status of server-auto-exposure-cluster-ip's pods: 05:50:26 | DEBUG | RoutesTest | Kubernetes | - server-auto-exposure-cluster-ip-987b698bc-v45fv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:50:24Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:50:26 | DEBUG | RoutesTest | Kubernetes | All 1 replicas found in ready state for server-auto-exposure-cluster-ip 05:50:26 | DEBUG | RoutesTest | Kubernetes | Took 3 seconds for k8s deployment server-auto-exposure-cluster-ip 05:50:26 | DEBUG | RoutesTest | Kubernetes | Updating deployment server-auto-exposure-cluster-ip with 1 pods 05:50:26 | DEBUG | RoutesTest | OpenShift | Creating a route: server-auto-exposure-cluster-ip 05:50:26 | DEBUG | RoutesTest | OpenShift | Deleting a route: server-auto-exposure-cluster-ip 05:50:26 | DEBUG | RoutesTest | Kubernetes | server-auto-exposure-cluster-ip: Service deleting... 05:50:26 | DEBUG | RoutesTest | Kubernetes | server-auto-exposure-cluster-ip: Service deleted 05:50:26 | DEBUG | RoutesTest | Kubernetes | Removed the deployment: server-auto-exposure-cluster-ip 05:50:26 | INFO | RoutesTest | RoutesTest | Ending testcase RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-auto-exposure-cluster-ip, autoExposeAsService: true, exposeAsService: true, loadBalancer: false, #0] PASSED RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-auto-exposure-lb, autoExposeAsService: true, exposeAsService: true, loadBalancer: true, #1] STANDARD_OUT 05:50:26 | INFO | RoutesTest | RoutesTest | Starting testcase: Verify that routes are detected correctly [deploymentName: server-auto-exposure-lb, autoExposeAsService: true, exposeAsService: true, loadBalancer: true, #1] 05:50:26 | DEBUG | RoutesTest | OpenShift | Namespace qa already exists 05:50:26 | DEBUG | RoutesTest | Kubernetes | server-auto-exposure-lb service created 05:50:26 | DEBUG | RoutesTest | Kubernetes | Waiting for LB external IP for server-auto-exposure-lb 05:50:30 | DEBUG | RoutesTest | Kubernetes | LB IP: a4e18a7f54d634b6098c9e0e9cb50cab-1258967671.XXXXXXXXX.elb.amazonaws.com 05:50:30 | DEBUG | RoutesTest | Kubernetes | Told the orchestrator to createOrReplace server-auto-exposure-lb 05:50:30 | DEBUG | RoutesTest | Kubernetes | Waiting for LB external IP for server-auto-exposure-lb 05:50:30 | DEBUG | RoutesTest | Kubernetes | LB IP: a4e18a7f54d634b6098c9e0e9cb50cab-1258967671.XXXXXXXXX.elb.amazonaws.com 05:50:30 | DEBUG | RoutesTest | Kubernetes | Waiting for server-auto-exposure-lb to start 05:50:30 | DEBUG | RoutesTest | Kubernetes | Status of server-auto-exposure-lb's pods: 05:50:30 | DEBUG | RoutesTest | Kubernetes | - server-auto-exposure-lb-6579dbc465-jrwq2 Container status: [] 05:50:30 | DEBUG | RoutesTest | Kubernetes | 0/1 are in the ready state for server-auto-exposure-lb 05:50:33 | DEBUG | RoutesTest | Kubernetes | Waiting for server-auto-exposure-lb to start 05:50:33 | DEBUG | RoutesTest | Kubernetes | Status of server-auto-exposure-lb's pods: 05:50:33 | DEBUG | RoutesTest | Kubernetes | - server-auto-exposure-lb-6579dbc465-jrwq2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:50:31Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:50:33 | DEBUG | RoutesTest | Kubernetes | All 1 replicas found in ready state for server-auto-exposure-lb 05:50:33 | DEBUG | RoutesTest | Kubernetes | Took 3 seconds for k8s deployment server-auto-exposure-lb 05:50:33 | DEBUG | RoutesTest | Kubernetes | Updating deployment server-auto-exposure-lb with 1 pods 05:50:33 | DEBUG | RoutesTest | OpenShift | Creating a route: server-auto-exposure-lb 05:50:33 | DEBUG | RoutesTest | OpenShift | Deleting a route: server-auto-exposure-lb 05:50:34 | DEBUG | RoutesTest | Kubernetes | server-auto-exposure-lb: Service deleting... 05:50:34 | DEBUG | RoutesTest | Kubernetes | server-auto-exposure-lb: Service deleted 05:50:34 | DEBUG | RoutesTest | Kubernetes | Removed the deployment: server-auto-exposure-lb 05:50:34 | INFO | RoutesTest | RoutesTest | Ending testcase RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-auto-exposure-lb, autoExposeAsService: true, exposeAsService: true, loadBalancer: true, #1] PASSED RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-exposure-cluster-ip, autoExposeAsService: false, exposeAsService: true, loadBalancer: false, #2] STANDARD_OUT 05:50:34 | INFO | RoutesTest | RoutesTest | Starting testcase: Verify that routes are detected correctly [deploymentName: server-exposure-cluster-ip, autoExposeAsService: false, exposeAsService: true, loadBalancer: false, #2] 05:50:34 | DEBUG | RoutesTest | OpenShift | Namespace qa already exists 05:50:34 | DEBUG | RoutesTest | Kubernetes | Told the orchestrator to createOrReplace server-exposure-cluster-ip 05:50:34 | DEBUG | RoutesTest | Kubernetes | Waiting for server-exposure-cluster-ip to start 05:50:34 | DEBUG | RoutesTest | Kubernetes | Status of server-exposure-cluster-ip's pods: 05:50:34 | DEBUG | RoutesTest | Kubernetes | - server-exposure-cluster-ip-6d89b9f757-545gf Container status: [] 05:50:34 | DEBUG | RoutesTest | Kubernetes | 0/1 are in the ready state for server-exposure-cluster-ip 05:50:37 | DEBUG | RoutesTest | Kubernetes | Waiting for server-exposure-cluster-ip to start 05:50:37 | DEBUG | RoutesTest | Kubernetes | Status of server-exposure-cluster-ip's pods: 05:50:37 | DEBUG | RoutesTest | Kubernetes | - server-exposure-cluster-ip-6d89b9f757-545gf Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:50:34Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:50:37 | DEBUG | RoutesTest | Kubernetes | All 1 replicas found in ready state for server-exposure-cluster-ip 05:50:37 | DEBUG | RoutesTest | Kubernetes | Took 3 seconds for k8s deployment server-exposure-cluster-ip 05:50:37 | DEBUG | RoutesTest | Kubernetes | Updating deployment server-exposure-cluster-ip with 1 pods 05:50:37 | DEBUG | RoutesTest | Kubernetes | server-exposure-cluster-ip service created 05:50:37 | DEBUG | RoutesTest | OpenShift | Creating a route: server-exposure-cluster-ip 05:50:37 | DEBUG | RoutesTest | Kubernetes | server-exposure-cluster-ip: Service deleting... 05:50:37 | DEBUG | RoutesTest | Kubernetes | server-exposure-cluster-ip: Service deleted 05:50:37 | DEBUG | RoutesTest | OpenShift | Deleting a route: server-exposure-cluster-ip 05:50:37 | DEBUG | RoutesTest | Kubernetes | Removed the deployment: server-exposure-cluster-ip 05:50:37 | INFO | RoutesTest | RoutesTest | Ending testcase RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-exposure-cluster-ip, autoExposeAsService: false, exposeAsService: true, loadBalancer: false, #2] PASSED RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-exposure-lb, autoExposeAsService: false, exposeAsService: true, loadBalancer: true, #3] STANDARD_OUT 05:50:37 | INFO | RoutesTest | RoutesTest | Starting testcase: Verify that routes are detected correctly [deploymentName: server-exposure-lb, autoExposeAsService: false, exposeAsService: true, loadBalancer: true, #3] 05:50:37 | DEBUG | RoutesTest | OpenShift | Namespace qa already exists 05:50:37 | DEBUG | RoutesTest | Kubernetes | Told the orchestrator to createOrReplace server-exposure-lb 05:50:37 | DEBUG | RoutesTest | Kubernetes | Waiting for server-exposure-lb to start 05:50:37 | DEBUG | RoutesTest | Kubernetes | Status of server-exposure-lb's pods: 05:50:37 | DEBUG | RoutesTest | Kubernetes | - server-exposure-lb-8459647fb7-ftf8h Container status: [] 05:50:37 | DEBUG | RoutesTest | Kubernetes | 0/1 are in the ready state for server-exposure-lb 05:50:40 | DEBUG | RoutesTest | Kubernetes | Waiting for server-exposure-lb to start 05:50:40 | DEBUG | RoutesTest | Kubernetes | Status of server-exposure-lb's pods: 05:50:40 | DEBUG | RoutesTest | Kubernetes | - server-exposure-lb-8459647fb7-ftf8h Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:50:38Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:50:40 | DEBUG | RoutesTest | Kubernetes | All 1 replicas found in ready state for server-exposure-lb 05:50:40 | DEBUG | RoutesTest | Kubernetes | Took 3 seconds for k8s deployment server-exposure-lb 05:50:40 | DEBUG | RoutesTest | Kubernetes | Updating deployment server-exposure-lb with 1 pods 05:50:40 | DEBUG | RoutesTest | Kubernetes | server-exposure-lb service created 05:50:40 | DEBUG | RoutesTest | OpenShift | Creating a route: server-exposure-lb 05:50:40 | DEBUG | RoutesTest | Kubernetes | server-exposure-lb: Service deleting... 05:50:40 | DEBUG | RoutesTest | Kubernetes | server-exposure-lb: Service deleted 05:50:40 | DEBUG | RoutesTest | OpenShift | Deleting a route: server-exposure-lb 05:50:40 | DEBUG | RoutesTest | Kubernetes | Removed the deployment: server-exposure-lb 05:50:40 | INFO | RoutesTest | RoutesTest | Ending testcase RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-exposure-lb, autoExposeAsService: false, exposeAsService: true, loadBalancer: true, #3] PASSED RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-no-exposure, autoExposeAsService: false, exposeAsService: false, loadBalancer: false, #4] STANDARD_OUT 05:50:40 | INFO | RoutesTest | RoutesTest | Starting testcase: Verify that routes are detected correctly [deploymentName: server-no-exposure, autoExposeAsService: false, exposeAsService: false, loadBalancer: false, #4] 05:50:40 | DEBUG | RoutesTest | OpenShift | Namespace qa already exists 05:50:40 | DEBUG | RoutesTest | Kubernetes | Told the orchestrator to createOrReplace server-no-exposure 05:50:40 | DEBUG | RoutesTest | Kubernetes | Waiting for server-no-exposure to start 05:50:40 | DEBUG | RoutesTest | Kubernetes | Status of server-no-exposure's pods: 05:50:40 | DEBUG | RoutesTest | Kubernetes | - server-no-exposure-9586bd5d6-hx4t9 Container status: [] 05:50:40 | DEBUG | RoutesTest | Kubernetes | 0/1 are in the ready state for server-no-exposure 05:50:43 | DEBUG | RoutesTest | Kubernetes | Waiting for server-no-exposure to start 05:50:43 | DEBUG | RoutesTest | Kubernetes | Status of server-no-exposure's pods: 05:50:43 | DEBUG | RoutesTest | Kubernetes | - server-no-exposure-9586bd5d6-hx4t9 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:50:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:50:43 | DEBUG | RoutesTest | Kubernetes | All 1 replicas found in ready state for server-no-exposure 05:50:43 | DEBUG | RoutesTest | Kubernetes | Took 3 seconds for k8s deployment server-no-exposure 05:50:43 | DEBUG | RoutesTest | Kubernetes | Updating deployment server-no-exposure with 1 pods 05:50:44 | DEBUG | RoutesTest | OpenShift | Creating a route: server-no-exposure 05:50:44 | DEBUG | RoutesTest | OpenShift | Deleting a route: server-no-exposure 05:50:44 | DEBUG | RoutesTest | Kubernetes | Removed the deployment: server-no-exposure 05:50:44 | INFO | RoutesTest | RoutesTest | Ending testcase RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-no-exposure, autoExposeAsService: false, exposeAsService: false, loadBalancer: false, #4] PASSED RoutesTest STANDARD_OUT 05:50:44 | INFO | RoutesTest | RoutesTest | Ending testsuite 05:50:44 | INFO | RoutesTest | RoutesTest | Checking if cluster is healthy after test 05:50:44 | DEBUG | RoutesTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries RuntimePolicyTest STANDARD_OUT 05:50:44 | INFO | RuntimePolicyTest | RuntimePolicyTest | Starting testsuite 05:50:44 | DEBUG | RuntimePolicyTest | OpenShift | Namespace qa already exists 05:50:44 | DEBUG | RuntimePolicyTest | Kubernetes | Told the orchestrator to createOrReplace runtimenginx 05:50:44 | DEBUG | RuntimePolicyTest | OpenShift | Namespace qa already exists 05:50:44 | DEBUG | RuntimePolicyTest | Kubernetes | Told the orchestrator to createOrReplace runtimeredis 05:50:44 | DEBUG | RuntimePolicyTest | Kubernetes | Waiting for runtimenginx to start 05:50:44 | DEBUG | RuntimePolicyTest | Kubernetes | Status of runtimenginx's pods: 05:50:44 | DEBUG | RuntimePolicyTest | Kubernetes | - runtimenginx-7fb699ff88-7w6fg Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:50:44 | DEBUG | RuntimePolicyTest | Kubernetes | 0/1 are in the ready state for runtimenginx 05:50:47 | DEBUG | RuntimePolicyTest | Kubernetes | Waiting for runtimenginx to start 05:50:47 | DEBUG | RuntimePolicyTest | Kubernetes | Status of runtimenginx's pods: 05:50:47 | DEBUG | RuntimePolicyTest | Kubernetes | - runtimenginx-7fb699ff88-7w6fg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:50:45Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:50:47 | DEBUG | RuntimePolicyTest | Kubernetes | All 1 replicas found in ready state for runtimenginx 05:50:47 | DEBUG | RuntimePolicyTest | Kubernetes | Took 3 seconds for k8s deployment runtimenginx 05:50:47 | DEBUG | RuntimePolicyTest | Kubernetes | Updating deployment runtimenginx with 1 pods 05:50:47 | DEBUG | RuntimePolicyTest | Kubernetes | Waiting for runtimeredis to start 05:50:47 | DEBUG | RuntimePolicyTest | Kubernetes | Status of runtimeredis's pods: 05:50:47 | DEBUG | RuntimePolicyTest | Kubernetes | - runtimeredis-7b99fc6d65-89j5v Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:50:45Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:50:47 | DEBUG | RuntimePolicyTest | Kubernetes | All 1 replicas found in ready state for runtimeredis 05:50:47 | DEBUG | RuntimePolicyTest | Kubernetes | Took 0 seconds for k8s deployment runtimeredis 05:50:47 | DEBUG | RuntimePolicyTest | Kubernetes | Updating deployment runtimeredis with 1 pods 05:50:47 | INFO | RuntimePolicyTest | Services | SR found deployment runtimenginx within 0s 05:50:47 | INFO | RuntimePolicyTest | Services | SR found deployment runtimeredis within 0s RuntimePolicyTest > Verify runtime policy : #policyName can be triggered - #depName > Verify runtime policy : Ubuntu Package Manager Execution can be triggered - runtimenginx STANDARD_OUT 05:50:47 | INFO | RuntimePolicyTest | RuntimePolicyTest | Starting testcase: Verify runtime policy : Ubuntu Package Manager Execution can be triggered - runtimenginx 05:50:47 | DEBUG | RuntimePolicyTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:50:47 | INFO | RuntimePolicyTest | Services | violation size is: 1 05:50:47 | INFO | RuntimePolicyTest | Services | Ubuntu Package Manager Execution triggered after waiting 0 seconds 05:50:47 | INFO | RuntimePolicyTest | RuntimePolicyTest | Ending testcase RuntimePolicyTest > Verify runtime policy : #policyName can be triggered - #depName > Verify runtime policy : Ubuntu Package Manager Execution can be triggered - runtimenginx PASSED RuntimePolicyTest > Verify runtime policy : #policyName can be triggered - #depName > Verify runtime policy : Ubuntu Package Manager Execution can be triggered - runtimeredis STANDARD_OUT 05:50:47 | INFO | RuntimePolicyTest | RuntimePolicyTest | Starting testcase: Verify runtime policy : Ubuntu Package Manager Execution can be triggered - runtimeredis 05:50:47 | DEBUG | RuntimePolicyTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:50:50 | DEBUG | RuntimePolicyTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:50:50 | INFO | RuntimePolicyTest | Services | violation size is: 1 05:50:50 | INFO | RuntimePolicyTest | Services | Ubuntu Package Manager Execution triggered after waiting 3 seconds 05:50:50 | INFO | RuntimePolicyTest | RuntimePolicyTest | Ending testcase RuntimePolicyTest > Verify runtime policy : #policyName can be triggered - #depName > Verify runtime policy : Ubuntu Package Manager Execution can be triggered - runtimeredis PASSED RuntimePolicyTest > Verify runtime alert violations are resolved once policy is removed STANDARD_OUT 05:50:50 | INFO | RuntimePolicyTest | RuntimePolicyTest | Starting testcase: Verify runtime alert violations are resolved once policy is removed 05:50:50 | DEBUG | RuntimePolicyTest | OpenShift | Namespace qa already exists 05:50:50 | DEBUG | RuntimePolicyTest | Kubernetes | Told the orchestrator to createOrReplace runtimeremoval 05:50:50 | DEBUG | RuntimePolicyTest | Kubernetes | Waiting for runtimeremoval to start 05:50:50 | DEBUG | RuntimePolicyTest | Kubernetes | Status of runtimeremoval's pods: 05:50:50 | DEBUG | RuntimePolicyTest | Kubernetes | - runtimeremoval-7fd5488db9-n4vz8 Container status: [] 05:50:50 | DEBUG | RuntimePolicyTest | Kubernetes | 0/1 are in the ready state for runtimeremoval 05:50:53 | DEBUG | RuntimePolicyTest | Kubernetes | Waiting for runtimeremoval to start 05:50:53 | DEBUG | RuntimePolicyTest | Kubernetes | Status of runtimeremoval's pods: 05:50:53 | DEBUG | RuntimePolicyTest | Kubernetes | - runtimeremoval-7fd5488db9-n4vz8 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:50:51Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:50:53 | DEBUG | RuntimePolicyTest | Kubernetes | All 1 replicas found in ready state for runtimeremoval 05:50:53 | DEBUG | RuntimePolicyTest | Kubernetes | Took 3 seconds for k8s deployment runtimeremoval 05:50:53 | DEBUG | RuntimePolicyTest | Kubernetes | Updating deployment runtimeremoval with 1 pods 05:50:53 | DEBUG | RuntimePolicyTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:50:53 | INFO | RuntimePolicyTest | Services | violation size is: 1 05:50:53 | INFO | RuntimePolicyTest | Services | runtime-removal-policy triggered after waiting 0 seconds 05:50:53 | DEBUG | RuntimePolicyTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:50:54 | INFO | RuntimePolicyTest | Services | violation size is: 1 05:50:54 | INFO | RuntimePolicyTest | Services | runtime-removal-policy triggered after waiting 0 seconds 05:50:54 | DEBUG | RuntimePolicyTest | Kubernetes | Removed the deployment: runtimeremoval 05:50:54 | INFO | RuntimePolicyTest | RuntimePolicyTest | Ending testcase RuntimePolicyTest > Verify runtime alert violations are resolved once policy is removed PASSED RuntimePolicyTest STANDARD_OUT 05:50:54 | DEBUG | RuntimePolicyTest | Kubernetes | Removed the deployment: runtimenginx 05:50:54 | DEBUG | RuntimePolicyTest | Kubernetes | Removed the deployment: runtimeredis 05:50:54 | INFO | RuntimePolicyTest | RuntimePolicyTest | Ending testsuite 05:50:54 | INFO | RuntimePolicyTest | RuntimePolicyTest | Checking if cluster is healthy after test 05:50:54 | DEBUG | RuntimePolicyTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries RuntimeViolationLifecycleTest STANDARD_OUT 05:50:54 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Starting testsuite RuntimeViolationLifecycleTest > Verify runtime excluded scope lifecycle STANDARD_OUT 05:50:54 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Starting testcase: Verify runtime excluded scope lifecycle 05:50:54 | DEBUG | RuntimeViolationLifecycle | OpenShift | Namespace qa already exists 05:50:54 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Told the orchestrator to createOrReplace runtimeviolationlifecycle 05:50:54 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Waiting for runtimeviolationlifecycle to start 05:50:54 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Status of runtimeviolationlifecycle's pods: 05:50:54 | DEBUG | RuntimeViolationLifecycle | Kubernetes | - runtimeviolationlifecycle-767975dd69-ps2pd Container status: [] 05:50:54 | DEBUG | RuntimeViolationLifecycle | Kubernetes | 0/1 are in the ready state for runtimeviolationlifecycle 05:50:57 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Waiting for runtimeviolationlifecycle to start 05:50:57 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Status of runtimeviolationlifecycle's pods: 05:50:57 | DEBUG | RuntimeViolationLifecycle | Kubernetes | - runtimeviolationlifecycle-767975dd69-ps2pd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:50:54Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:50:57 | DEBUG | RuntimeViolationLifecycle | Kubernetes | All 1 replicas found in ready state for runtimeviolationlifecycle 05:50:57 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Took 3 seconds for k8s deployment runtimeviolationlifecycle 05:50:57 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Updating deployment runtimeviolationlifecycle with 1 pods 05:50:57 | INFO | RuntimeViolationLifecycle | Services | SR found deployment runtimeviolationlifecycle within 0s 05:50:57 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolations with 3 retries 05:50:57 | INFO | RuntimeViolationLifecycle | Services | violation size is: 1 05:50:57 | INFO | RuntimeViolationLifecycle | Services | Ubuntu Package Manager Execution triggered after waiting 0 seconds 05:50:57 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolation with 3 retries 05:50:57 | INFO | RuntimeViolationLifecycle | Services | Updated Ubuntu Package Manager Execution to excluded scope runtimeviolationlifecycle 05:50:58 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolation with 3 retries 05:50:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Removed the deployment: runtimeviolationlifecycle 05:50:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | runtimeviolationlifecycle: deployment removed. 05:50:58 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Ending testcase RuntimeViolationLifecycleTest > Verify runtime excluded scope lifecycle PASSED RuntimeViolationLifecycleTest > Verify runtime alert remains after deletion STANDARD_OUT 05:50:58 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Starting testcase: Verify runtime alert remains after deletion 05:50:58 | DEBUG | RuntimeViolationLifecycle | OpenShift | Namespace qa already exists 05:50:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Told the orchestrator to createOrReplace runtimeviolationlifecycle 05:50:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Waiting for runtimeviolationlifecycle to start 05:50:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Status of runtimeviolationlifecycle's pods: 05:50:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | - runtimeviolationlifecycle-767975dd69-gc2zr Container status: [] 05:50:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | - runtimeviolationlifecycle-767975dd69-ps2pd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:50:54Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:50:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | 0/1 are in the ready state for runtimeviolationlifecycle 05:51:01 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Waiting for runtimeviolationlifecycle to start 05:51:01 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Status of runtimeviolationlifecycle's pods: 05:51:01 | DEBUG | RuntimeViolationLifecycle | Kubernetes | - runtimeviolationlifecycle-767975dd69-gc2zr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:50:59Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:01 | DEBUG | RuntimeViolationLifecycle | Kubernetes | - runtimeviolationlifecycle-767975dd69-ps2pd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:50:54Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:01 | DEBUG | RuntimeViolationLifecycle | Kubernetes | All 1 replicas found in ready state for runtimeviolationlifecycle 05:51:01 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Took 3 seconds for k8s deployment runtimeviolationlifecycle 05:51:01 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Updating deployment runtimeviolationlifecycle with 2 pods 05:51:01 | INFO | RuntimeViolationLifecycle | Services | SR found deployment runtimeviolationlifecycle within 0s 05:51:01 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolations with 3 retries 05:51:01 | INFO | RuntimeViolationLifecycle | Services | violation size is: 1 05:51:01 | INFO | RuntimeViolationLifecycle | Services | Ubuntu Package Manager Execution triggered after waiting 0 seconds 05:51:01 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolation with 3 retries 05:51:01 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolation with 3 retries 05:51:02 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Removed the deployment: runtimeviolationlifecycle 05:51:02 | DEBUG | RuntimeViolationLifecycle | Kubernetes | runtimeviolationlifecycle: deployment removed. 05:51:02 | INFO | RuntimeViolationLifecycle | Services | SR does not detect the deployment runtimeviolationlifecycle yet: io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id '8893f21c-f84b-4710-830b-81c6f41d0b2a' does not exist: not found 05:51:02 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolations with 3 retries 05:51:02 | INFO | RuntimeViolationLifecycle | Services | violation size is: 1 05:51:02 | INFO | RuntimeViolationLifecycle | Services | Ubuntu Package Manager Execution triggered after waiting 0 seconds 05:51:02 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolation with 3 retries 05:51:02 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolation with 3 retries 05:51:02 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Ending testcase RuntimeViolationLifecycleTest > Verify runtime alert remains after deletion PASSED RuntimeViolationLifecycleTest STANDARD_OUT 05:51:02 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Ending testsuite 05:51:02 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Checking if cluster is healthy after test 05:51:02 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries SACTest STANDARD_OUT 05:51:02 | INFO | SACTest | SACTest | Starting testsuite 05:51:02 | DEBUG | SACTest | Kubernetes | Removed the deployment: sac-deploymentnginx-qa1 05:51:02 | DEBUG | SACTest | Kubernetes | Removed the deployment: sac-deploymentnginx-qa2 05:51:02 | DEBUG | SACTest | Kubernetes | sac-deploymentnginx-qa1: deployment removed. 05:51:02 | DEBUG | SACTest | Kubernetes | sac-deploymentnginx-qa2: deployment removed. 05:51:02 | INFO | SACTest | OpenShift | Created namespace qa-test1 05:51:02 | INFO | SACTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-test1 namespace. 05:51:02 | DEBUG | SACTest | Kubernetes | quay: secret created. 05:51:02 | DEBUG | SACTest | Kubernetes | default-dockercfg-9g79g: secret created. 05:51:02 | DEBUG | SACTest | Kubernetes | redhat-image-pull-secret: secret created. 05:51:02 | DEBUG | SACTest | Kubernetes | public-dockerhub: secret created. 05:51:02 | DEBUG | SACTest | Kubernetes | gcr-image-pull-secret: secret created. 05:51:02 | DEBUG | SACTest | OpenShift | Adding system:serviceaccount:qa-test1:default to anyuid user list 05:51:02 | DEBUG | SACTest | Kubernetes | Told the orchestrator to createOrReplace sac-deploymentnginx-qa1 05:51:03 | INFO | SACTest | OpenShift | Created namespace qa-test2 05:51:03 | INFO | SACTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-test2 namespace. 05:51:03 | DEBUG | SACTest | Kubernetes | quay: secret created. 05:51:03 | DEBUG | SACTest | Kubernetes | default-dockercfg-9g79g: secret created. 05:51:03 | DEBUG | SACTest | Kubernetes | redhat-image-pull-secret: secret created. 05:51:03 | DEBUG | SACTest | Kubernetes | public-dockerhub: secret created. 05:51:03 | DEBUG | SACTest | Kubernetes | gcr-image-pull-secret: secret created. 05:51:03 | DEBUG | SACTest | OpenShift | Adding system:serviceaccount:qa-test2:default to anyuid user list 05:51:03 | DEBUG | SACTest | Kubernetes | Told the orchestrator to createOrReplace sac-deploymentnginx-qa2 05:51:03 | DEBUG | SACTest | Kubernetes | Waiting for sac-deploymentnginx-qa1 to start 05:51:03 | DEBUG | SACTest | Kubernetes | Status of sac-deploymentnginx-qa1's pods: 05:51:03 | DEBUG | SACTest | Kubernetes | - sac-deploymentnginx-qa1-6d946c8564-gzzd5 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:51:03 | DEBUG | SACTest | Kubernetes | 0/1 are in the ready state for sac-deploymentnginx-qa1 05:51:06 | DEBUG | SACTest | Kubernetes | Waiting for sac-deploymentnginx-qa1 to start 05:51:06 | DEBUG | SACTest | Kubernetes | Status of sac-deploymentnginx-qa1's pods: 05:51:06 | DEBUG | SACTest | Kubernetes | - sac-deploymentnginx-qa1-6d946c8564-gzzd5 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:51:03Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:06 | DEBUG | SACTest | Kubernetes | All 1 replicas found in ready state for sac-deploymentnginx-qa1 05:51:06 | DEBUG | SACTest | Kubernetes | Took 3 seconds for k8s deployment sac-deploymentnginx-qa1 05:51:06 | DEBUG | SACTest | Kubernetes | Updating deployment sac-deploymentnginx-qa1 with 1 pods 05:51:06 | DEBUG | SACTest | Kubernetes | Waiting for sac-deploymentnginx-qa2 to start 05:51:06 | DEBUG | SACTest | Kubernetes | Status of sac-deploymentnginx-qa2's pods: 05:51:06 | DEBUG | SACTest | Kubernetes | - sac-deploymentnginx-qa2-5dd989d545-zr6z6 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:51:04Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:06 | DEBUG | SACTest | Kubernetes | All 1 replicas found in ready state for sac-deploymentnginx-qa2 05:51:06 | DEBUG | SACTest | Kubernetes | Took 0 seconds for k8s deployment sac-deploymentnginx-qa2 05:51:06 | DEBUG | SACTest | Kubernetes | Updating deployment sac-deploymentnginx-qa2 with 1 pods 05:51:06 | INFO | SACTest | Services | SR found deployment sac-deploymentnginx-qa1 within 0s 05:51:06 | INFO | SACTest | Services | SR found deployment sac-deploymentnginx-qa2 within 0s 05:51:06 | DEBUG | SACTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:51:09 | DEBUG | SACTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:51:09 | INFO | SACTest | Services | violation size is: 1 05:51:09 | INFO | SACTest | Services | Secure Shell (ssh) Port Exposed triggered after waiting 3 seconds 05:51:09 | DEBUG | SACTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:51:09 | INFO | SACTest | Services | violation size is: 1 05:51:09 | INFO | SACTest | Services | Secure Shell (ssh) Port Exposed triggered after waiting 0 seconds SACTest > Verify that only namespace #sacResource is visible when using SAC > Verify that only namespace qa-test2 is visible when using SAC STANDARD_OUT 05:51:10 | INFO | SACTest | SACTest | Starting testcase: Verify that only namespace qa-test2 is visible when using SAC 05:51:10 | INFO | SACTest | SACTest | [id: "50827a6d-7e04-490b-8a46-32b8057973b9" name: "sac-deploymentnginx-qa2" cluster: "remote" cluster_id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" namespace: "qa-test2" created { seconds: 1761889863 } priority: 51 hash: 6352820084439404072 ] 05:51:10 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify that only namespace #sacResource is visible when using SAC > Verify that only namespace qa-test2 is visible when using SAC PASSED SACTest > Verify alerts count is scoped STANDARD_OUT 05:51:10 | INFO | SACTest | SACTest | Starting testcase: Verify alerts count is scoped 05:51:10 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify alerts count is scoped PASSED SACTest > Verify ListSecrets using a token without access receives no results STANDARD_OUT 05:51:10 | INFO | SACTest | SACTest | Starting testcase: Verify ListSecrets using a token without access receives no results 05:51:10 | DEBUG | SACTest | Kubernetes | sac-secret: secret created. 05:51:10 | DEBUG | SACTest | Helpers | Calling services.SecretService.waitForSecret with 10 retries 05:51:10 | DEBUG | SACTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:51:15 | DEBUG | SACTest | Kubernetes | sac-secret: Secret removed. 05:51:15 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify ListSecrets using a token without access receives no results PASSED SACTest > Verify ListSecrets using a token with access receives some results STANDARD_OUT 05:51:15 | INFO | SACTest | SACTest | Starting testcase: Verify ListSecrets using a token with access receives some results 05:51:15 | DEBUG | SACTest | Kubernetes | sac-secret: secret created. 05:51:15 | DEBUG | SACTest | Helpers | Calling services.SecretService.waitForSecret with 10 retries 05:51:15 | DEBUG | SACTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:51:15 | DEBUG | SACTest | Kubernetes | sac-secret: secret created. 05:51:15 | DEBUG | SACTest | Helpers | Calling services.SecretService.waitForSecret with 10 retries 05:51:15 | DEBUG | SACTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:51:21 | DEBUG | SACTest | Kubernetes | sac-secret: Secret removed. 05:51:26 | DEBUG | SACTest | Kubernetes | sac-secret: Secret removed. 05:51:26 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify ListSecrets using a token with access receives some results PASSED SACTest > Verify Search on #category resources using the #tokenName token returns #numResults results > Verify Search on Cluster resources using the noAccess token returns 0 results STANDARD_OUT 05:51:26 | INFO | SACTest | SACTest | Starting testcase: Verify Search on Cluster resources using the noAccess token returns 0 results 05:51:26 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Search on #category resources using the #tokenName token returns #numResults results > Verify Search on Cluster resources using the noAccess token returns 0 results PASSED SACTest > Verify Search on #category resources using the #tokenName token returns #numResults results > Verify Search on Deployment resources using the searchDeploymentsToken token returns 1 results STANDARD_OUT 05:51:26 | INFO | SACTest | SACTest | Starting testcase: Verify Search on Deployment resources using the searchDeploymentsToken token returns 1 results 05:51:26 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Search on #category resources using the #tokenName token returns #numResults results > Verify Search on Deployment resources using the searchDeploymentsToken token returns 1 results PASSED SACTest > Verify Search on #category resources using the #tokenName token returns #numResults results > Verify Search on Image resources using the searchImagesToken token returns 1 results STANDARD_OUT 05:51:26 | INFO | SACTest | SACTest | Starting testcase: Verify Search on Image resources using the searchImagesToken token returns 1 results 05:51:26 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Search on #category resources using the #tokenName token returns #numResults results > Verify Search on Image resources using the searchImagesToken token returns 1 results PASSED SACTest > Verify Search on #category resources using the #tokenName token returns >= #minReturned results > Verify Search on Deployment resources using the searchAlertsToken token returns >= 1 results STANDARD_OUT 05:51:26 | INFO | SACTest | SACTest | Starting testcase: Verify Search on Deployment resources using the searchAlertsToken token returns >= 1 results 05:51:26 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Search on #category resources using the #tokenName token returns >= #minReturned results > Verify Search on Deployment resources using the searchAlertsToken token returns >= 1 results PASSED SACTest > Verify Search using the allAccessToken returns results for all search categories STANDARD_OUT 05:51:26 | INFO | SACTest | SACTest | Starting testcase: Verify Search using the allAccessToken returns results for all search categories 05:51:26 | DEBUG | SACTest | Kubernetes | sac-secret: secret created. 05:51:26 | DEBUG | SACTest | Helpers | Calling services.SecretService.waitForSecret with 10 retries 05:51:26 | DEBUG | SACTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:51:31 | DEBUG | SACTest | Kubernetes | sac-secret: Secret removed. 05:51:31 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Search using the allAccessToken returns results for all search categories PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Deployment resources using the noAccess token returns 0 results STANDARD_OUT 05:51:31 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Deployment resources using the noAccess token returns 0 results 05:51:31 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Deployment resources using the noAccess token returns 0 results PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Image resources using the noAccess token returns 0 results STANDARD_OUT 05:51:31 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Image resources using the noAccess token returns 0 results 05:51:31 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Image resources using the noAccess token returns 0 results PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Deployment resources using the searchDeploymentsToken token returns 1 results STANDARD_OUT 05:51:31 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Deployment resources using the searchDeploymentsToken token returns 1 results 05:51:31 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Deployment resources using the searchDeploymentsToken token returns 1 results PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Image resources using the searchImagesToken token returns 1 results STANDARD_OUT 05:51:31 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Image resources using the searchImagesToken token returns 1 results 05:51:31 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Image resources using the searchImagesToken token returns 1 results PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Namespace resources using the searchNamespacesToken token returns 1 results STANDARD_OUT 05:51:31 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Namespace resources using the searchNamespacesToken token returns 1 results 05:51:31 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Namespace resources using the searchNamespacesToken token returns 1 results PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns >= to #minReturned results > Verify Autocomplete on Deployment resources using the allAccessToken token returns >= to 2 results STANDARD_OUT 05:51:31 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Deployment resources using the allAccessToken token returns >= to 2 results 05:51:31 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns >= to #minReturned results > Verify Autocomplete on Deployment resources using the allAccessToken token returns >= to 2 results PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns >= to #minReturned results > Verify Autocomplete on Image resources using the allAccessToken token returns >= to 1 results STANDARD_OUT 05:51:31 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Image resources using the allAccessToken token returns >= to 1 results 05:51:31 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns >= to #minReturned results > Verify Autocomplete on Image resources using the allAccessToken token returns >= to 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Deployment service returns 0 results STANDARD_OUT 05:51:31 | INFO | SACTest | SACTest | Starting testcase: Verify using the noAccess token with the Deployment service returns 0 results 05:51:32 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Deployment service returns 0 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the searchDeploymentsToken token with the Deployment service returns 1 results STANDARD_OUT 05:51:32 | INFO | SACTest | SACTest | Starting testcase: Verify using the searchDeploymentsToken token with the Deployment service returns 1 results 05:51:32 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the searchDeploymentsToken token with the Deployment service returns 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Alert service returns 0 results STANDARD_OUT 05:51:32 | INFO | SACTest | SACTest | Starting testcase: Verify using the noAccess token with the Alert service returns 0 results 05:51:32 | DEBUG | SACTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:51:32 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Alert service returns 0 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Image service returns 0 results STANDARD_OUT 05:51:32 | INFO | SACTest | SACTest | Starting testcase: Verify using the noAccess token with the Image service returns 0 results 05:51:32 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Image service returns 0 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Namespace service returns 0 results STANDARD_OUT 05:51:32 | INFO | SACTest | SACTest | Starting testcase: Verify using the noAccess token with the Namespace service returns 0 results 05:51:32 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Namespace service returns 0 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the searchNamespacesToken token with the Namespace service returns 1 results STANDARD_OUT 05:51:32 | INFO | SACTest | SACTest | Starting testcase: Verify using the searchNamespacesToken token with the Namespace service returns 1 results 05:51:32 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the searchNamespacesToken token with the Namespace service returns 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the searchImagesToken token with the Image service returns 1 results STANDARD_OUT 05:51:32 | INFO | SACTest | SACTest | Starting testcase: Verify using the searchImagesToken token with the Image service returns 1 results 05:51:32 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the searchImagesToken token with the Image service returns 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Alert service returns >= to 1 results STANDARD_OUT 05:51:32 | INFO | SACTest | SACTest | Starting testcase: Verify using the allAccessToken token with the Alert service returns >= to 1 results 05:51:32 | DEBUG | SACTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:51:32 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Alert service returns >= to 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the searchAlertsToken token with the Alert service returns >= to 1 results STANDARD_OUT 05:51:32 | INFO | SACTest | SACTest | Starting testcase: Verify using the searchAlertsToken token with the Alert service returns >= to 1 results 05:51:32 | DEBUG | SACTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:51:32 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the searchAlertsToken token with the Alert service returns >= to 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Image service returns >= to 1 results STANDARD_OUT 05:51:32 | INFO | SACTest | SACTest | Starting testcase: Verify using the allAccessToken token with the Image service returns >= to 1 results 05:51:38 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Image service returns >= to 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Deployment service returns >= to 2 results STANDARD_OUT 05:51:38 | INFO | SACTest | SACTest | Starting testcase: Verify using the allAccessToken token with the Deployment service returns >= to 2 results 05:51:38 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Deployment service returns >= to 2 results PASSED SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Namespace service returns >= to 2 results STANDARD_OUT 05:51:38 | INFO | SACTest | SACTest | Starting testcase: Verify using the allAccessToken token with the Namespace service returns >= to 2 results 05:51:38 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Namespace service returns >= to 2 results PASSED SACTest > Verify Namespace service SAC is enforced properly when using the #tokenName token > Verify Namespace service SAC is enforced properly when using the noAccess token STANDARD_OUT 05:51:38 | INFO | SACTest | SACTest | Starting testcase: Verify Namespace service SAC is enforced properly when using the noAccess token 05:51:39 | ERROR | SACTest | NamespaceService | Could not find namespace 097e20d4-4c31-4323-8a5f-4d7aa29dd007 io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Namespace '097e20d4-4c31-4323-8a5f-4d7aa29dd007' not found: invalid arguments at io.stackrox.proto.api.v1.NamespaceServiceGrpc$NamespaceServiceBlockingStub.getNamespace(NamespaceServiceGrpc.java:213) [3 skipped] at services.NamespaceService.getNamespace(NamespaceService.groovy:26) at SACTest.$spock_feature_1_11(SACTest.groovy:554) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:39 | ERROR | SACTest | NamespaceService | Could not find namespace 27289d1c-c085-4336-80e3-90fddb944db5 io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Namespace '27289d1c-c085-4336-80e3-90fddb944db5' not found: invalid arguments at io.stackrox.proto.api.v1.NamespaceServiceGrpc$NamespaceServiceBlockingStub.getNamespace(NamespaceServiceGrpc.java:213) [3 skipped] at services.NamespaceService.getNamespace(NamespaceService.groovy:26) at SACTest.$spock_feature_1_11(SACTest.groovy:555) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:39 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Namespace service SAC is enforced properly when using the #tokenName token > Verify Namespace service SAC is enforced properly when using the noAccess token PASSED SACTest > Verify Namespace service SAC is enforced properly when using the #tokenName token > Verify Namespace service SAC is enforced properly when using the searchNamespacesToken token STANDARD_OUT 05:51:39 | INFO | SACTest | SACTest | Starting testcase: Verify Namespace service SAC is enforced properly when using the searchNamespacesToken token 05:51:39 | ERROR | SACTest | NamespaceService | Could not find namespace 27289d1c-c085-4336-80e3-90fddb944db5 io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Namespace '27289d1c-c085-4336-80e3-90fddb944db5' not found: invalid arguments at io.stackrox.proto.api.v1.NamespaceServiceGrpc$NamespaceServiceBlockingStub.getNamespace(NamespaceServiceGrpc.java:213) [3 skipped] at services.NamespaceService.getNamespace(NamespaceService.groovy:26) at SACTest.$spock_feature_1_11(SACTest.groovy:555) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:39 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Namespace service SAC is enforced properly when using the #tokenName token > Verify Namespace service SAC is enforced properly when using the searchNamespacesToken token PASSED SACTest > Verify Namespace service SAC is enforced properly when using the #tokenName token > Verify Namespace service SAC is enforced properly when using the allAccessToken token STANDARD_OUT 05:51:39 | INFO | SACTest | SACTest | Starting testcase: Verify Namespace service SAC is enforced properly when using the allAccessToken token 05:51:39 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Namespace service SAC is enforced properly when using the #tokenName token > Verify Namespace service SAC is enforced properly when using the allAccessToken token PASSED SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token noAccess yields the same number of results as restricted search STANDARD_OUT 05:51:39 | INFO | SACTest | SACTest | Starting testcase: Verify search with SAC and token noAccess yields the same number of results as restricted search 05:51:39 | INFO | SACTest | SACTest | With basic auth + restricted query: 0 05:51:39 | INFO | SACTest | SACTest | With all access token + restricted query: 0 05:51:39 | INFO | SACTest | SACTest | With SAC restricted token + unrestricted query: 0 05:51:39 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token noAccess yields the same number of results as restricted search PASSED SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token kubeSystemDeploymentsImagesToken yields the same number of results as restricted search STANDARD_OUT 05:51:39 | INFO | SACTest | SACTest | Starting testcase: Verify search with SAC and token kubeSystemDeploymentsImagesToken yields the same number of results as restricted search 05:51:40 | INFO | SACTest | SACTest | With basic auth + restricted query: 0 05:51:40 | INFO | SACTest | SACTest | With all access token + restricted query: 0 05:51:40 | INFO | SACTest | SACTest | With SAC restricted token + unrestricted query: 0 05:51:40 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token kubeSystemDeploymentsImagesToken yields the same number of results as restricted search PASSED SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token searchNamespacesToken yields the same number of results as restricted search STANDARD_OUT 05:51:40 | INFO | SACTest | SACTest | Starting testcase: Verify search with SAC and token searchNamespacesToken yields the same number of results as restricted search 05:51:40 | INFO | SACTest | SACTest | With basic auth + restricted query: 1 05:51:40 | INFO | SACTest | SACTest | With all access token + restricted query: 1 05:51:40 | INFO | SACTest | SACTest | With SAC restricted token + unrestricted query: 1 05:51:40 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token searchNamespacesToken yields the same number of results as restricted search PASSED SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token searchDeploymentsToken yields the same number of results as restricted search STANDARD_OUT 05:51:40 | INFO | SACTest | SACTest | Starting testcase: Verify search with SAC and token searchDeploymentsToken yields the same number of results as restricted search 05:51:40 | INFO | SACTest | SACTest | With basic auth + restricted query: 1 05:51:40 | INFO | SACTest | SACTest | With all access token + restricted query: 1 05:51:40 | INFO | SACTest | SACTest | With SAC restricted token + unrestricted query: 1 05:51:40 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token searchDeploymentsToken yields the same number of results as restricted search PASSED SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token searchDeploymentsImagesToken yields the same number of results as restricted search STANDARD_OUT 05:51:40 | INFO | SACTest | SACTest | Starting testcase: Verify search with SAC and token searchDeploymentsImagesToken yields the same number of results as restricted search 05:51:40 | INFO | SACTest | SACTest | With basic auth + restricted query: 1 05:51:40 | INFO | SACTest | SACTest | With all access token + restricted query: 1 05:51:40 | INFO | SACTest | SACTest | With SAC restricted token + unrestricted query: 1 05:51:40 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token searchDeploymentsImagesToken yields the same number of results as restricted search PASSED SACTest > Verify that SAC has the same effect as query restriction for network flows STANDARD_OUT 05:51:40 | INFO | SACTest | SACTest | Starting testcase: Verify that SAC has the same effect as query restriction for network flows 05:51:40 | INFO | SACTest | SACTest | allAccessFlows: [stackrox/scanner -> openshift-dns/dns-default, stackrox/collector -> stackrox/sensor, openshift-kube-apiserver/kube-apiserver-ip-10-0-40-239.ec2.internal -> stackrox/admission-control, openshift-kube-apiserver/kube-apiserver-ip-10-0-119-203.ec2.internal -> stackrox/admission-control, stackrox/central -> openshift-dns/dns-default, openshift-kube-apiserver-operator/kube-apiserver-operator -> stackrox/admission-control, openshift-monitoring/prometheus-k8s -> stackrox/sensor, openshift-monitoring/prometheus-k8s -> stackrox/central, openshift-operator-lifecycle-manager/packageserver -> stackrox-operator/stackrox-operator-test-index-q698h, stackrox/central -> openshift-image-registry/image-registry, openshift-kube-apiserver/kube-apiserver-ip-10-0-52-51.ec2.internal -> stackrox/admission-control, stackrox/central -> INTERNET, stackrox/central -> stackrox/central-db, stackrox/scanner -> stackrox/scanner-db, stackrox/central -> stackrox/scanner, stackrox/config-controller -> stackrox/central, stackrox/sensor -> stackrox/central, stackrox/admission-control -> stackrox/sensor] 05:51:40 | INFO | SACTest | SACTest | allAccessFlowsWithoutNeighbors: [stackrox/collector -> stackrox/sensor, stackrox/central -> INTERNET, stackrox/central -> stackrox/central-db, stackrox/scanner -> stackrox/scanner-db, stackrox/central -> stackrox/scanner, stackrox/config-controller -> stackrox/central, stackrox/sensor -> stackrox/central, stackrox/admission-control -> stackrox/sensor] 05:51:40 | INFO | SACTest | SACTest | sacFlows: [stackrox/collector -> stackrox/sensor, stackrox/central -> masked namespace #1/masked deployment #1, masked namespace #5/masked deployment #6 -> stackrox/central, masked namespace #3/masked deployment #7 -> stackrox/admission-control, stackrox/central -> masked namespace #2/masked deployment #2, masked namespace #4/masked deployment #5 -> stackrox/admission-control, masked namespace #3/masked deployment #4 -> stackrox/admission-control, stackrox/central -> INTERNET, stackrox/central -> stackrox/central-db, stackrox/scanner -> masked namespace #1/masked deployment #1, stackrox/scanner -> stackrox/scanner-db, stackrox/central -> stackrox/scanner, stackrox/config-controller -> stackrox/central, masked namespace #5/masked deployment #6 -> stackrox/sensor, stackrox/sensor -> stackrox/central, stackrox/admission-control -> stackrox/sensor, masked namespace #3/masked deployment #3 -> stackrox/admission-control] 05:51:40 | INFO | SACTest | SACTest | sacFlowsNoQuery: [stackrox/collector -> stackrox/sensor, stackrox/central -> masked namespace #1/masked deployment #1, masked namespace #5/masked deployment #6 -> stackrox/central, masked namespace #3/masked deployment #7 -> stackrox/admission-control, stackrox/central -> masked namespace #2/masked deployment #2, masked namespace #4/masked deployment #5 -> stackrox/admission-control, masked namespace #3/masked deployment #4 -> stackrox/admission-control, stackrox/central -> INTERNET, stackrox/central -> stackrox/central-db, stackrox/scanner -> masked namespace #1/masked deployment #1, stackrox/scanner -> stackrox/scanner-db, stackrox/central -> stackrox/scanner, stackrox/config-controller -> stackrox/central, masked namespace #5/masked deployment #6 -> stackrox/sensor, stackrox/sensor -> stackrox/central, stackrox/admission-control -> stackrox/sensor, masked namespace #3/masked deployment #3 -> stackrox/admission-control] 05:51:40 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify that SAC has the same effect as query restriction for network flows PASSED SACTest > test role aggregation should not combine permissions sets STANDARD_OUT 05:51:40 | INFO | SACTest | SACTest | Starting testcase: test role aggregation should not combine permissions sets 05:51:40 | INFO | SACTest | SACTest | Ending testcase SACTest > test role aggregation should not combine permissions sets PASSED SACTest > Verify using the #tokenName token gets #numResults results when retrieving the current cluster > Verify using the noAccess token gets 0 results when retrieving the current cluster STANDARD_OUT 05:51:40 | INFO | SACTest | SACTest | Starting testcase: Verify using the noAccess token gets 0 results when retrieving the current cluster 05:51:40 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token gets #numResults results when retrieving the current cluster > Verify using the noAccess token gets 0 results when retrieving the current cluster PASSED SACTest > Verify using the #tokenName token gets #numResults results when retrieving the current cluster > Verify using the getClusterToken token gets 1 results when retrieving the current cluster STANDARD_OUT 05:51:40 | INFO | SACTest | SACTest | Starting testcase: Verify using the getClusterToken token gets 1 results when retrieving the current cluster 05:51:40 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token gets #numResults results when retrieving the current cluster > Verify using the getClusterToken token gets 1 results when retrieving the current cluster PASSED SACTest > Verify using the #tokenName token gets #numResults results when retrieving the current cluster > Verify using the allAccessToken token gets 1 results when retrieving the current cluster STANDARD_OUT 05:51:40 | INFO | SACTest | SACTest | Starting testcase: Verify using the allAccessToken token gets 1 results when retrieving the current cluster 05:51:40 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token gets #numResults results when retrieving the current cluster > Verify using the allAccessToken token gets 1 results when retrieving the current cluster PASSED SACTest STANDARD_OUT 05:51:40 | DEBUG | SACTest | Kubernetes | Removed the deployment: sac-deploymentnginx-qa1 05:51:40 | DEBUG | SACTest | Kubernetes | Removed the deployment: sac-deploymentnginx-qa2 05:51:40 | DEBUG | SACTest | Kubernetes | Waiting for namespace qa-test1 to be deleted 05:51:40 | DEBUG | SACTest | Kubernetes | Retrying in 3... 05:51:43 | DEBUG | SACTest | Kubernetes | Retrying in 3... 05:51:46 | DEBUG | SACTest | Kubernetes | K8s found that namespace qa-test1 was deleted 05:51:46 | DEBUG | SACTest | Kubernetes | Waiting for namespace qa-test1 to be deleted 05:51:46 | DEBUG | SACTest | Kubernetes | K8s found that namespace qa-test1 was deleted 05:51:46 | DEBUG | SACTest | Kubernetes | Waiting for namespace qa-test2 to be deleted 05:51:46 | DEBUG | SACTest | Kubernetes | Retrying in 3... 05:51:49 | DEBUG | SACTest | Kubernetes | Retrying in 3... 05:51:52 | DEBUG | SACTest | Kubernetes | K8s found that namespace qa-test2 was deleted 05:51:52 | DEBUG | SACTest | Kubernetes | Waiting for namespace qa-test2 to be deleted 05:51:52 | DEBUG | SACTest | Kubernetes | K8s found that namespace qa-test2 was deleted 05:51:53 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role ba44b5f8-014d-44e3-b6da-1c0e04343966 and permission set 05:51:53 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role ba44b5f8-014d-44e3-b6da-1c0e04343966 or associated access scope: io.grpc.StatusRuntimeException: INVALID_ARGUMENT: failed to delete access scope ffffffff-ffff-fff4-f5ff-fffffffffffe: default access scope "Deny All" cannot be modified or deleted: invalid arguments 05:51:53 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 27d49221-06ab-4a64-aa4b-387c2ed910c7 and permission set 05:51:53 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role 27d49221-06ab-4a64-aa4b-387c2ed910c7 or associated access scope: io.grpc.StatusRuntimeException: INVALID_ARGUMENT: failed to delete access scope ffffffff-ffff-fff4-f5ff-ffffffffffff: default access scope "Unrestricted" cannot be modified or deleted: invalid arguments 05:51:53 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 52d7be30-1cfc-49eb-9f8e-de1b57eab8a3 and permission set 05:51:53 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role 52d7be30-1cfc-49eb-9f8e-de1b57eab8a3 or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope 24068474-ac23-4d8e-899b-5b3aa332808f: cannot delete access scope in use by role "SACv2 Test Automation Role acd1281b-7cfb-42ae-a62a-cbdbf99a6b96": referenced by another object 05:51:53 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 314a6e05-f125-4f27-9974-ebf7d184485b and permission set 05:51:53 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role 314a6e05-f125-4f27-9974-ebf7d184485b or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope 9f37aacf-f7e1-40d3-bcce-11d7c48cf758: cannot delete access scope in use by role "SACv2 Test Automation Role ff7f696f-6fa3-45f3-a718-aef2f9cc2623": referenced by another object 05:51:53 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 8622fbaa-d2f5-46a9-9b65-0cd78504171b and permission set 05:51:53 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role 8622fbaa-d2f5-46a9-9b65-0cd78504171b or associated access scope: io.grpc.StatusRuntimeException: INVALID_ARGUMENT: failed to delete access scope ffffffff-ffff-fff4-f5ff-ffffffffffff: default access scope "Unrestricted" cannot be modified or deleted: invalid arguments 05:51:53 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role ff7f696f-6fa3-45f3-a718-aef2f9cc2623 and permission set 05:51:53 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role ff7f696f-6fa3-45f3-a718-aef2f9cc2623 or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope 9f37aacf-f7e1-40d3-bcce-11d7c48cf758: cannot delete access scope in use by role "SACv2 Test Automation Role 7a73a3ef-8fe0-43f9-b662-a76e71d3d5ed": referenced by another object 05:51:53 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 7a73a3ef-8fe0-43f9-b662-a76e71d3d5ed and permission set 05:51:53 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role 7a73a3ef-8fe0-43f9-b662-a76e71d3d5ed or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope 9f37aacf-f7e1-40d3-bcce-11d7c48cf758: cannot delete access scope in use by role "SACv2 Test Automation Role e010a46a-9057-4457-8cba-81825fd53874": referenced by another object 05:51:53 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role e010a46a-9057-4457-8cba-81825fd53874 and permission set 05:51:53 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role e010a46a-9057-4457-8cba-81825fd53874 or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope 9f37aacf-f7e1-40d3-bcce-11d7c48cf758: cannot delete access scope in use by role "SACv2 Test Automation Role e4cf96d5-5470-42c2-a118-dfc3b914eda6": referenced by another object 05:51:53 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role e4cf96d5-5470-42c2-a118-dfc3b914eda6 and permission set 05:51:53 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role e4cf96d5-5470-42c2-a118-dfc3b914eda6 or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope 9f37aacf-f7e1-40d3-bcce-11d7c48cf758: cannot delete access scope in use by role "SACv2 Test Automation Role 36a193f6-c17b-4052-b362-edcd1c2cd8a3": referenced by another object 05:51:53 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 36a193f6-c17b-4052-b362-edcd1c2cd8a3 and permission set 05:51:53 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role 36a193f6-c17b-4052-b362-edcd1c2cd8a3 or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope 9f37aacf-f7e1-40d3-bcce-11d7c48cf758: cannot delete access scope in use by role "SACv2 Test Automation Role dee7a516-2fba-4097-9c8c-1df9e81ffff5": referenced by another object 05:51:53 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 3b736f7d-7368-4f24-9d2a-a9ad0390edbc and permission set 05:51:53 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 897d3ba3-e282-496c-9702-21bc2c717fca and permission set 05:51:53 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role 897d3ba3-e282-496c-9702-21bc2c717fca or associated access scope: io.grpc.StatusRuntimeException: INVALID_ARGUMENT: failed to delete access scope ffffffff-ffff-fff4-f5ff-ffffffffffff: default access scope "Unrestricted" cannot be modified or deleted: invalid arguments 05:51:54 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role c9689aab-90f9-441e-82e5-aac235e982a8 and permission set 05:51:54 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role acd1281b-7cfb-42ae-a62a-cbdbf99a6b96 and permission set 05:51:54 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role dee7a516-2fba-4097-9c8c-1df9e81ffff5 and permission set 05:51:54 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role dee7a516-2fba-4097-9c8c-1df9e81ffff5 or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope 9f37aacf-f7e1-40d3-bcce-11d7c48cf758: cannot delete access scope in use by role "SACv2 Test Automation Role 2d615e01-2f90-4c29-a300-8abf0dcc1e6a": referenced by another object 05:51:54 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 2d615e01-2f90-4c29-a300-8abf0dcc1e6a and permission set 05:51:54 | INFO | SACTest | SACTest | Ending testsuite 05:51:54 | INFO | SACTest | SACTest | Checking if cluster is healthy after test 05:51:54 | DEBUG | SACTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries SecretsTest STANDARD_OUT 05:51:54 | INFO | SecretsTest | SecretsTest | Starting testsuite SecretsTest > Verify the secret api can return the secret's information when adding a new secret STANDARD_OUT 05:51:54 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret api can return the secret's information when adding a new secret 05:51:54 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 05:51:54 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:51:59 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 05:51:59 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret api can return the secret's information when adding a new secret PASSED SecretsTest > Verify the secret item should show the binding deployments (from env var: #fromEnv) > Verify the secret item should show the binding deployments (from env var: false) STANDARD_OUT 05:51:59 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret item should show the binding deployments (from env var: false) 05:51:59 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 05:51:59 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:51:59 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets 05:51:59 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 05:51:59 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 05:51:59 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-qpn8q Container status: [] 05:51:59 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets 05:52:02 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 05:52:02 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 05:52:02 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-qpn8q Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:00Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:02 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets 05:52:02 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets 05:52:02 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets with 1 pods 05:52:02 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:52:02 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets 05:52:02 | DEBUG | SecretsTest | Kubernetes | depwithsecrets: deployment removed. 05:52:07 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 05:52:07 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret item should show the binding deployments (from env var: #fromEnv) > Verify the secret item should show the binding deployments (from env var: false) PASSED SecretsTest > Verify the secret item should show the binding deployments (from env var: #fromEnv) > Verify the secret item should show the binding deployments (from env var: true) STANDARD_OUT 05:52:07 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret item should show the binding deployments (from env var: true) 05:52:07 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 05:52:07 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:52:07 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets 05:52:07 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 05:52:07 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 05:52:07 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-5w979 Container status: [] 05:52:07 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-qpn8q Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:00Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:07 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets 05:52:10 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 05:52:10 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 05:52:11 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-5w979 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:11 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-qpn8q Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:00Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:11 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets 05:52:11 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets 05:52:11 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets with 2 pods 05:52:11 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:52:11 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets 05:52:11 | DEBUG | SecretsTest | Kubernetes | depwithsecrets: deployment removed. 05:52:16 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 05:52:16 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret item should show the binding deployments (from env var: #fromEnv) > Verify the secret item should show the binding deployments (from env var: true) PASSED SecretsTest > Verify the secret should not show the deleted binding deployment (from env var: #fromEnv) > Verify the secret should not show the deleted binding deployment (from env var: false) STANDARD_OUT 05:52:16 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret should not show the deleted binding deployment (from env var: false) 05:52:16 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 05:52:16 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:52:16 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets 05:52:16 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 05:52:16 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 05:52:16 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-5w979 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:16 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-7jlbp Container status: [] 05:52:16 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-qpn8q Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:00Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:16 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets 05:52:19 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 05:52:19 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 05:52:19 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-5w979 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:19 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-7jlbp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:19 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-qpn8q Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:00Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:19 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets 05:52:19 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets 05:52:19 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets with 3 pods 05:52:19 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:52:19 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets 05:52:19 | DEBUG | SecretsTest | Kubernetes | depwithsecrets: deployment removed. 05:52:19 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:52:24 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 05:52:24 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret should not show the deleted binding deployment (from env var: #fromEnv) > Verify the secret should not show the deleted binding deployment (from env var: false) PASSED SecretsTest > Verify the secret should not show the deleted binding deployment (from env var: #fromEnv) > Verify the secret should not show the deleted binding deployment (from env var: true) STANDARD_OUT 05:52:24 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret should not show the deleted binding deployment (from env var: true) 05:52:24 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 05:52:24 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:52:24 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets 05:52:24 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 05:52:24 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 05:52:24 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-5w979 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:24 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-sctnb Container status: [] 05:52:24 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-7jlbp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:24 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-qpn8q Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:00Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:24 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets 05:52:27 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 05:52:27 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 05:52:27 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-5w979 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:27 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-sctnb Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:25Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:27 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-7jlbp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:27 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-qpn8q Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:00Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:27 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets 05:52:27 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets 05:52:27 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets with 4 pods 05:52:27 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:52:27 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets 05:52:27 | DEBUG | SecretsTest | Kubernetes | depwithsecrets: deployment removed. 05:52:27 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:52:32 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 05:52:32 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret should not show the deleted binding deployment (from env var: #fromEnv) > Verify the secret should not show the deleted binding deployment (from env var: true) PASSED SecretsTest > Verify the secret information should not be infected by the previous secrets (from env var: #fromEnv) > Verify the secret information should not be infected by the previous secrets (from env var: false) STANDARD_OUT 05:52:32 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret information should not be infected by the previous secrets (from env var: false) 05:52:32 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 05:52:32 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:52:32 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets 05:52:32 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 05:52:32 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 05:52:32 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-5w979 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:32 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-sctnb Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:25Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:32 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-7jlbp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:32 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-l4k5h Container status: [] 05:52:32 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-qpn8q Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:00Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:32 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets 05:52:35 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 05:52:35 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 05:52:35 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-5w979 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:35 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-sctnb Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:25Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:35 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-7jlbp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:35 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-l4k5h Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:33Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:35 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets 05:52:35 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets 05:52:36 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets with 4 pods 05:52:36 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets 05:52:36 | DEBUG | SecretsTest | Kubernetes | depwithsecrets: deployment removed. 05:52:36 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:52:36 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecretssec 05:52:36 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecretssec to start 05:52:36 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecretssec's pods: 05:52:36 | DEBUG | SecretsTest | Kubernetes | - depwithsecretssec-db9796b77-wtrxs Container status: [] 05:52:36 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecretssec 05:52:39 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecretssec to start 05:52:39 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecretssec's pods: 05:52:39 | DEBUG | SecretsTest | Kubernetes | - depwithsecretssec-db9796b77-wtrxs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:36Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:39 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecretssec 05:52:39 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecretssec 05:52:39 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecretssec with 1 pods 05:52:39 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:52:39 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecretssec 05:52:39 | DEBUG | SecretsTest | Kubernetes | depwithsecretssec: deployment removed. 05:52:44 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 05:52:44 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret information should not be infected by the previous secrets (from env var: #fromEnv) > Verify the secret information should not be infected by the previous secrets (from env var: false) PASSED SecretsTest > Verify the secret information should not be infected by the previous secrets (from env var: #fromEnv) > Verify the secret information should not be infected by the previous secrets (from env var: true) STANDARD_OUT 05:52:44 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret information should not be infected by the previous secrets (from env var: true) 05:52:44 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 05:52:44 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:52:44 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets 05:52:44 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 05:52:44 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 05:52:44 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-g55xm Container status: [] 05:52:44 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-sctnb Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:25Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:44 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-7jlbp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:44 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-l4k5h Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:33Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:44 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets 05:52:47 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 05:52:47 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 05:52:47 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-g55xm Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:45Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:47 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-sctnb Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:25Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:47 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-7jlbp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:47 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-l4k5h Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:33Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:47 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets 05:52:47 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets 05:52:47 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets with 4 pods 05:52:47 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets 05:52:47 | DEBUG | SecretsTest | Kubernetes | depwithsecrets: deployment removed. 05:52:47 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:52:47 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecretssec 05:52:47 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecretssec to start 05:52:47 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecretssec's pods: 05:52:47 | DEBUG | SecretsTest | Kubernetes | - depwithsecretssec-b67db675c-mv2d2 Container status: [] 05:52:47 | DEBUG | SecretsTest | Kubernetes | - depwithsecretssec-db9796b77-wtrxs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:36Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:47 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecretssec 05:52:50 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecretssec to start 05:52:50 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecretssec's pods: 05:52:50 | DEBUG | SecretsTest | Kubernetes | - depwithsecretssec-b67db675c-mv2d2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:48Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:50 | DEBUG | SecretsTest | Kubernetes | - depwithsecretssec-db9796b77-wtrxs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:36Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:50 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecretssec 05:52:50 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecretssec 05:52:50 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecretssec with 2 pods 05:52:50 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:52:50 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecretssec 05:52:50 | DEBUG | SecretsTest | Kubernetes | depwithsecretssec: deployment removed. 05:52:55 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 05:52:55 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret information should not be infected by the previous secrets (from env var: #fromEnv) > Verify the secret information should not be infected by the previous secrets (from env var: true) PASSED SecretsTest > Verify secrets page should not be messed up when a deployment's secret changed (from env var: #fromEnv) > Verify secrets page should not be messed up when a deployment's secret changed (from env var: false) STANDARD_OUT 05:52:55 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify secrets page should not be messed up when a deployment's secret changed (from env var: false) 05:52:55 | DEBUG | SecretsTest | Kubernetes | qasec1: secret created. 05:52:55 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:52:55 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets1 05:52:55 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 05:52:55 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 05:52:55 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-dnsxv Container status: [] 05:52:55 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets1 05:52:58 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 05:52:58 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 05:52:58 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-dnsxv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:56Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:52:58 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets1 05:52:58 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets1 05:52:58 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets1 with 1 pods 05:52:59 | DEBUG | SecretsTest | Kubernetes | qasec2: secret created. 05:52:59 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:52:59 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets2 05:52:59 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 05:52:59 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 05:52:59 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-4hc84 Container status: [] 05:52:59 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets2 05:53:02 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 05:53:02 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 05:53:02 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-4hc84 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:59Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:02 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets2 05:53:02 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets2 05:53:02 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets2 with 1 pods 05:53:02 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets1 05:53:02 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets2 05:53:02 | DEBUG | SecretsTest | Kubernetes | depwithsecrets1: deployment removed. 05:53:02 | DEBUG | SecretsTest | Kubernetes | depwithsecrets2: deployment removed. 05:53:02 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:53:02 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets1 05:53:02 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 05:53:02 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 05:53:02 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-6f6978b469-5wwwg Container status: [] 05:53:02 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-dnsxv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:56Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:02 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets1 05:53:05 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 05:53:05 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 05:53:05 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-6f6978b469-5wwwg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:03Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:05 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-dnsxv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:56Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:05 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets1 05:53:05 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets1 05:53:05 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets1 with 2 pods 05:53:05 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:53:05 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets2 05:53:05 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 05:53:05 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 05:53:05 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-4hc84 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:59Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:05 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-86547fd56b-nxh79 Container status: [] 05:53:05 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets2 05:53:08 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 05:53:08 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 05:53:08 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-4hc84 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:59Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:08 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-86547fd56b-nxh79 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:08 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets2 05:53:08 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets2 05:53:08 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets2 with 2 pods 05:53:08 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:53:08 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:53:08 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets1 05:53:08 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets2 05:53:08 | DEBUG | SecretsTest | Kubernetes | depwithsecrets1: deployment removed. 05:53:08 | DEBUG | SecretsTest | Kubernetes | depwithsecrets2: deployment removed. 05:53:13 | DEBUG | SecretsTest | Kubernetes | qasec1: Secret removed. 05:53:18 | DEBUG | SecretsTest | Kubernetes | qasec2: Secret removed. 05:53:18 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify secrets page should not be messed up when a deployment's secret changed (from env var: #fromEnv) > Verify secrets page should not be messed up when a deployment's secret changed (from env var: false) PASSED SecretsTest > Verify secrets page should not be messed up when a deployment's secret changed (from env var: #fromEnv) > Verify secrets page should not be messed up when a deployment's secret changed (from env var: true) STANDARD_OUT 05:53:18 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify secrets page should not be messed up when a deployment's secret changed (from env var: true) 05:53:18 | DEBUG | SecretsTest | Kubernetes | qasec1: secret created. 05:53:18 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:53:18 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets1 05:53:18 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 05:53:18 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 05:53:18 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-6f6978b469-5wwwg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:03Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:18 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-dnsxv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:56Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:18 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-866df45d68-xtsdm Container status: [] 05:53:18 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets1 05:53:21 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 05:53:21 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 05:53:21 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-6f6978b469-5wwwg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:03Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:21 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-dnsxv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:56Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:21 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-866df45d68-xtsdm Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:19Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:21 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets1 05:53:21 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets1 05:53:21 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets1 with 3 pods 05:53:22 | DEBUG | SecretsTest | Kubernetes | qasec2: secret created. 05:53:22 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:53:22 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets2 05:53:22 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 05:53:22 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 05:53:22 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-4hc84 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:59Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:22 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-7f794b4c8f-2hjkj Container status: [] 05:53:22 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-86547fd56b-nxh79 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:22 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets2 05:53:25 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 05:53:25 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 05:53:25 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-4hc84 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:59Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:25 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-7f794b4c8f-2hjkj Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:22Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:25 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-86547fd56b-nxh79 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:25 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets2 05:53:25 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets2 05:53:25 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets2 with 3 pods 05:53:25 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets1 05:53:25 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets2 05:53:25 | DEBUG | SecretsTest | Kubernetes | depwithsecrets1: deployment removed. 05:53:25 | DEBUG | SecretsTest | Kubernetes | depwithsecrets2: deployment removed. 05:53:25 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:53:25 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets1 05:53:25 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 05:53:25 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 05:53:25 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-6f6978b469-5wwwg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:03Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:25 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-747d665f69-tjc7f Container status: [] 05:53:25 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-dnsxv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:56Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:25 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-866df45d68-xtsdm Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:19Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:25 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets1 05:53:28 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 05:53:28 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 05:53:28 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-6f6978b469-5wwwg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:03Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:28 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-747d665f69-tjc7f Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:26Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:28 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-dnsxv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:56Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:28 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-866df45d68-xtsdm Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:19Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:28 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets1 05:53:28 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets1 05:53:28 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets1 with 4 pods 05:53:28 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 05:53:28 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets2 05:53:28 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 05:53:28 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 05:53:28 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-4hc84 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:59Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:28 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-7f794b4c8f-2hjkj Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:22Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:28 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-86547fd56b-nxh79 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:28 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-fcdb8cb9b-d7qf6 Container status: [] 05:53:28 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets2 05:53:31 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 05:53:31 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 05:53:31 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-4hc84 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:52:59Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:31 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-7f794b4c8f-2hjkj Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:22Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:31 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-86547fd56b-nxh79 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:31 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-fcdb8cb9b-d7qf6 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:53:29Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:31 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets2 05:53:31 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets2 05:53:31 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets2 with 4 pods 05:53:31 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:53:31 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:53:31 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets1 05:53:31 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets2 05:53:31 | DEBUG | SecretsTest | Kubernetes | depwithsecrets1: deployment removed. 05:53:31 | DEBUG | SecretsTest | Kubernetes | depwithsecrets2: deployment removed. 05:53:36 | DEBUG | SecretsTest | Kubernetes | qasec1: Secret removed. 05:53:41 | DEBUG | SecretsTest | Kubernetes | qasec2: Secret removed. 05:53:41 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify secrets page should not be messed up when a deployment's secret changed (from env var: #fromEnv) > Verify secrets page should not be messed up when a deployment's secret changed (from env var: true) PASSED SecretsTest STANDARD_OUT 05:53:41 | INFO | SecretsTest | SecretsTest | Ending testsuite 05:53:41 | INFO | SecretsTest | SecretsTest | Checking if cluster is healthy after test 05:53:41 | DEBUG | SecretsTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries VulnMgmtTest STANDARD_OUT 05:53:41 | INFO | VulnMgmtTest | VulnMgmtTest | Starting testsuite 05:54:04 | INFO | VulnMgmtTest | VulnMgmtTest | Ending testsuite 05:54:04 | INFO | VulnMgmtTest | VulnMgmtTest | Checking if cluster is healthy after test 05:54:04 | DEBUG | VulnMgmtTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries VulnMgmtWorkflowTest STANDARD_OUT 05:54:04 | INFO | VulnMgmtWorkflowTest | VulnMgmtWorkflowTest | Starting testsuite 05:54:04 | DEBUG | VulnMgmtWorkflowTest | OpenShift | Namespace qa already exists 05:54:04 | DEBUG | VulnMgmtWorkflowTest | Kubernetes | Told the orchestrator to createOrReplace vulnerable-deploy 05:54:04 | DEBUG | VulnMgmtWorkflowTest | Kubernetes | Waiting for vulnerable-deploy to start 05:54:04 | DEBUG | VulnMgmtWorkflowTest | Kubernetes | Status of vulnerable-deploy's pods: 05:54:04 | DEBUG | VulnMgmtWorkflowTest | Kubernetes | - vulnerable-deploy-79c946cfbb-5gkvb Container status: [] 05:54:04 | DEBUG | VulnMgmtWorkflowTest | Kubernetes | 0/1 are in the ready state for vulnerable-deploy 05:54:07 | DEBUG | VulnMgmtWorkflowTest | Kubernetes | Waiting for vulnerable-deploy to start 05:54:07 | DEBUG | VulnMgmtWorkflowTest | Kubernetes | Status of vulnerable-deploy's pods: 05:54:07 | DEBUG | VulnMgmtWorkflowTest | Kubernetes | - vulnerable-deploy-79c946cfbb-5gkvb Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:54:05Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:54:07 | DEBUG | VulnMgmtWorkflowTest | Kubernetes | All 1 replicas found in ready state for vulnerable-deploy 05:54:07 | DEBUG | VulnMgmtWorkflowTest | Kubernetes | Took 3 seconds for k8s deployment vulnerable-deploy 05:54:07 | DEBUG | VulnMgmtWorkflowTest | Kubernetes | Updating deployment vulnerable-deploy with 1 pods 05:54:07 | DEBUG | VulnMgmtWorkflowTest | Kubernetes | Removed the deployment: vulnerable-deploy 05:54:07 | INFO | VulnMgmtWorkflowTest | VulnMgmtWorkflowTest | Ending testsuite 05:54:07 | INFO | VulnMgmtWorkflowTest | VulnMgmtWorkflowTest | Checking if cluster is healthy after test 05:54:07 | DEBUG | VulnMgmtWorkflowTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries VulnReportingTest STANDARD_OUT 05:54:07 | INFO | VulnReportingTest | VulnReportingTest | Starting testsuite 05:54:07 | DEBUG | VulnReportingTest | OpenShift | Namespace qa already exists 05:54:08 | DEBUG | VulnReportingTest | Kubernetes | Told the orchestrator to createOrReplace maildev-f722bb0f-9dd9-497c-ae14-be8cb128cb59 05:54:08 | DEBUG | VulnReportingTest | Kubernetes | Waiting for maildev-f722bb0f-9dd9-497c-ae14-be8cb128cb59 to start 05:54:08 | DEBUG | VulnReportingTest | Kubernetes | Status of maildev-f722bb0f-9dd9-497c-ae14-be8cb128cb59's pods: 05:54:08 | DEBUG | VulnReportingTest | Kubernetes | - maildev-f722bb0f-9dd9-497c-ae14-be8cb128cb59-5f7487b7d7-hslsg Container status: [] 05:54:08 | DEBUG | VulnReportingTest | Kubernetes | 0/1 are in the ready state for maildev-f722bb0f-9dd9-497c-ae14-be8cb128cb59 05:54:11 | DEBUG | VulnReportingTest | Kubernetes | Waiting for maildev-f722bb0f-9dd9-497c-ae14-be8cb128cb59 to start 05:54:11 | DEBUG | VulnReportingTest | Kubernetes | Status of maildev-f722bb0f-9dd9-497c-ae14-be8cb128cb59's pods: 05:54:11 | DEBUG | VulnReportingTest | Kubernetes | - maildev-f722bb0f-9dd9-497c-ae14-be8cb128cb59-5f7487b7d7-hslsg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:54:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:54:11 | DEBUG | VulnReportingTest | Kubernetes | All 1 replicas found in ready state for maildev-f722bb0f-9dd9-497c-ae14-be8cb128cb59 05:54:11 | DEBUG | VulnReportingTest | Kubernetes | Took 3 seconds for k8s deployment maildev-f722bb0f-9dd9-497c-ae14-be8cb128cb59 05:54:11 | DEBUG | VulnReportingTest | Kubernetes | Updating deployment maildev-f722bb0f-9dd9-497c-ae14-be8cb128cb59 with 1 pods 05:54:11 | DEBUG | VulnReportingTest | Kubernetes | maildev-smtp-f722bb0f-9dd9-497c-ae14-be8cb128cb59: Service created 05:54:11 | DEBUG | VulnReportingTest | Kubernetes | maildev-web-f722bb0f-9dd9-497c-ae14-be8cb128cb59: Service created 05:55:11 | INFO | VulnReportingTest | OpenShift | Created namespace qa-vulnreport-2nd-namespace 05:55:11 | INFO | VulnReportingTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-vulnreport-2nd-namespace namespace. 05:55:11 | DEBUG | VulnReportingTest | Kubernetes | quay: secret created. 05:55:11 | DEBUG | VulnReportingTest | Kubernetes | default-dockercfg-9g79g: secret created. 05:55:11 | DEBUG | VulnReportingTest | Kubernetes | redhat-image-pull-secret: secret created. 05:55:11 | DEBUG | VulnReportingTest | Kubernetes | public-dockerhub: secret created. 05:55:11 | DEBUG | VulnReportingTest | Kubernetes | gcr-image-pull-secret: secret created. 05:55:11 | DEBUG | VulnReportingTest | OpenShift | Adding system:serviceaccount:qa-vulnreport-2nd-namespace:default to anyuid user list 05:55:11 | DEBUG | VulnReportingTest | OpenShift | Namespace qa already exists 05:55:11 | DEBUG | VulnReportingTest | Kubernetes | Told the orchestrator to createOrReplace struts-deployment 05:55:11 | DEBUG | VulnReportingTest | OpenShift | Namespace qa-vulnreport-2nd-namespace already exists 05:55:11 | DEBUG | VulnReportingTest | Kubernetes | Told the orchestrator to createOrReplace registry-deployment 05:55:11 | DEBUG | VulnReportingTest | Kubernetes | Waiting for struts-deployment to start 05:55:11 | DEBUG | VulnReportingTest | Kubernetes | Status of struts-deployment's pods: 05:55:11 | DEBUG | VulnReportingTest | Kubernetes | - struts-deployment-85f97b6d49-zp44j Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:55:11 | DEBUG | VulnReportingTest | Kubernetes | 0/1 are in the ready state for struts-deployment 05:55:14 | DEBUG | VulnReportingTest | Kubernetes | Waiting for struts-deployment to start 05:55:14 | DEBUG | VulnReportingTest | Kubernetes | Status of struts-deployment's pods: 05:55:14 | DEBUG | VulnReportingTest | Kubernetes | - struts-deployment-85f97b6d49-zp44j Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:55:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:55:14 | DEBUG | VulnReportingTest | Kubernetes | All 1 replicas found in ready state for struts-deployment 05:55:14 | DEBUG | VulnReportingTest | Kubernetes | Took 3 seconds for k8s deployment struts-deployment 05:55:14 | DEBUG | VulnReportingTest | Kubernetes | Updating deployment struts-deployment with 1 pods 05:55:14 | DEBUG | VulnReportingTest | Kubernetes | Waiting for registry-deployment to start 05:55:14 | DEBUG | VulnReportingTest | Kubernetes | Status of registry-deployment's pods: 05:55:14 | DEBUG | VulnReportingTest | Kubernetes | - registry-deployment-6557fc79fd-q277n Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:55:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:55:14 | DEBUG | VulnReportingTest | Kubernetes | All 1 replicas found in ready state for registry-deployment 05:55:14 | DEBUG | VulnReportingTest | Kubernetes | Took 0 seconds for k8s deployment registry-deployment 05:55:14 | DEBUG | VulnReportingTest | Kubernetes | Updating deployment registry-deployment with 1 pods 05:55:15 | INFO | VulnReportingTest | Services | SR found deployment struts-deployment within 0s 05:55:15 | INFO | VulnReportingTest | Services | SR found deployment registry-deployment within 0s VulnReportingTest > Verify vulnerability generated using a collection sends an email with a valid report attachment SKIPPED VulnReportingTest STANDARD_OUT 05:55:15 | DEBUG | VulnReportingTest | Kubernetes | maildev-smtp-f722bb0f-9dd9-497c-ae14-be8cb128cb59: Service deleting... 05:55:15 | DEBUG | VulnReportingTest | Kubernetes | maildev-smtp-f722bb0f-9dd9-497c-ae14-be8cb128cb59: Service deleted 05:55:15 | DEBUG | VulnReportingTest | Kubernetes | maildev-web-f722bb0f-9dd9-497c-ae14-be8cb128cb59: Service deleting... 05:55:15 | DEBUG | VulnReportingTest | Kubernetes | maildev-web-f722bb0f-9dd9-497c-ae14-be8cb128cb59: Service deleted 05:55:15 | DEBUG | VulnReportingTest | Kubernetes | Waiting for service maildev-smtp-f722bb0f-9dd9-497c-ae14-be8cb128cb59 to be deleted 05:55:15 | DEBUG | VulnReportingTest | Kubernetes | maildev-smtp-f722bb0f-9dd9-497c-ae14-be8cb128cb59: service removed. 05:55:15 | DEBUG | VulnReportingTest | Kubernetes | Waiting for service maildev-web-f722bb0f-9dd9-497c-ae14-be8cb128cb59 to be deleted 05:55:15 | DEBUG | VulnReportingTest | Kubernetes | maildev-web-f722bb0f-9dd9-497c-ae14-be8cb128cb59: service removed. 05:55:15 | DEBUG | VulnReportingTest | Kubernetes | Removed the deployment: maildev-f722bb0f-9dd9-497c-ae14-be8cb128cb59 05:55:15 | DEBUG | VulnReportingTest | Kubernetes | Removed the deployment: struts-deployment 05:55:15 | DEBUG | VulnReportingTest | Kubernetes | Removed the deployment: registry-deployment 05:55:15 | DEBUG | VulnReportingTest | Kubernetes | Waiting for namespace qa-vulnreport-2nd-namespace to be deleted 05:55:15 | DEBUG | VulnReportingTest | Kubernetes | Retrying in 3... 05:55:18 | DEBUG | VulnReportingTest | Kubernetes | Retrying in 3... 05:55:21 | DEBUG | VulnReportingTest | Kubernetes | K8s found that namespace qa-vulnreport-2nd-namespace was deleted 05:55:21 | INFO | VulnReportingTest | VulnReportingTest | Ending testsuite 05:55:21 | INFO | VulnReportingTest | VulnReportingTest | Checking if cluster is healthy after test 05:55:21 | DEBUG | VulnReportingTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries VulnScanWithGraphQLTest STANDARD_OUT 05:55:21 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | Starting testsuite 05:55:21 | DEBUG | VulnScanWithGraphQLTest | OpenShift | Namespace qa already exists 05:55:21 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Told the orchestrator to createOrReplace qastruts 05:55:21 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Waiting for qastruts to start 05:55:21 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Status of qastruts's pods: 05:55:21 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | - qastruts-868b56784f-w449k Container status: [] 05:55:21 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | 0/1 are in the ready state for qastruts 05:55:24 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Waiting for qastruts to start 05:55:24 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Status of qastruts's pods: 05:55:24 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | - qastruts-868b56784f-w449k Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-10-31T05:55:22Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:55:24 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | All 1 replicas found in ready state for qastruts 05:55:24 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Took 3 seconds for k8s deployment qastruts 05:55:24 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Updating deployment qastruts with 1 pods 05:55:24 | INFO | VulnScanWithGraphQLTest | Services | SR found deployment qastruts within 0s VulnScanWithGraphQLTest > Verify image vuln,cves,cvss on #depName in GraphQL > Verify image vuln,cves,cvss on qastruts in GraphQL STANDARD_OUT 05:55:24 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | Starting testcase: Verify image vuln,cves,cvss on qastruts in GraphQL 05:55:24 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | id e5c090dd-c2d9-4d76-94dd-973bf8961a8d 05:55:24 | DEBUG | VulnScanWithGraphQLTest | GraphQLService | GraphQL query: {"query":"query getDeployment($id: ID!) {\n deployment :\n deployment(id: $id) {\n images {\n scan\n {\n scanTime} id name {fullName}\n }\n }\n }\n","variables":{"id":"e5c090dd-c2d9-4d76-94dd-973bf8961a8d"}} 05:55:24 | DEBUG | VulnScanWithGraphQLTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"deployment":{"images":[{"scan":{"scanTime":"2025-10-31T05:45:03.537054597Z"},"id":"sha256:3401cc09305901ed505ddfccf3e533dde3f7fe326958131ee653d4067ab32246","name":{"fullName":"quay.io/rhacs-eng/qa-multi-arch:struts-app"}}]}}} 05:55:24 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | code 200 05:55:24 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | img.name ...[fullName:quay.io/rhacs-eng/qa-multi-arch:struts-app] 05:55:24 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | imageID found using deployment query 05:55:24 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | image id ...sha256:3401cc09305901ed505ddfccf3e533dde3f7fe326958131ee653d4067ab32246 05:55:24 | DEBUG | VulnScanWithGraphQLTest | GraphQLService | GraphQL query: {"query":"\n query image($id: ID!) {\n image:\n image(id: $id) {\n //cve_info here\n id\n lastUpdated\n deployments {\n id\n name\n }\n name {\n fullName\n registry\n remote\n tag\n }\n scan {\n imageComponents {\n name\n layerIndex\n version\n license {\n name\n type\n url\n }\n imageVulnerabilities {\n cve\n cvss\n link\n summary\n }\n }\n }\n }\n }","variables":{"id":"sha256:3401cc09305901ed505ddfccf3e533dde3f7fe326958131ee653d4067ab32246"}} 05:55:24 | DEBUG | VulnScanWithGraphQLTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"image":{"id":"sha256:3401cc09305901ed505ddfccf3e533dde3f7fe326958131ee653d4067ab32246","lastUpdated":"2025-10-31T05:45:03.607993618Z","deployments":[{"id":"e5c090dd-c2d9-4d76-94dd-973bf8961a8d","name":"qastruts"}],"name":{"fullName":"quay.io/rhacs-eng/qa-multi-arch:struts-app","registry":"quay.io","remote":"rhacs-eng/qa-multi-arch","tag":"struts-app"},"scan":{"imageComponents":[{"name":"acl","layerIndex":0,"version":"2.2.53-6","license":null,"imageVulnerabilities":[]},{"name":"adduser","layerIndex":0,"version":"3.118ubuntu2","license":null,"imageVulnerabilities":[]},{"name":"apr","layerIndex":17,"version":"1.6.5-1ubuntu1","license":null,"imageVulnerabilities":[{"cve":"CVE-2023-49582","cvss":5.5,"link":"https://ubuntu.com/security/CVE-2023-49582","summary":"Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data. This issue does not affect non-Unix platforms, or ... 05:55:24 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | return code 200 05:55:24 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | number of CVEs 251 05:55:24 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | Ending testcase VulnScanWithGraphQLTest > Verify image vuln,cves,cvss on #depName in GraphQL > Verify image vuln,cves,cvss on qastruts in GraphQL PASSED VulnScanWithGraphQLTest STANDARD_OUT 05:55:24 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Removed the deployment: qastruts 05:55:24 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | Ending testsuite 05:55:24 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | Checking if cluster is healthy after test 05:55:24 | DEBUG | VulnScanWithGraphQLTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries 05:55:24 | INFO | | BaseSpecification | Performing global shutdown 05:55:24 | INFO | | RoleService | Deleted role: Test Automation Role - 16043 and permission set 05:55:24 | INFO | | BaseSpecification | Removing core image registry integration 05:55:25 | DEBUG | | ImageIntegrationService | Image integration deleted: 25bf0825-177a-4805-997a-3b32da1c82bb [Incubating] Problems report is available at: file:///go/src/github.com/stackrox/stackrox/qa-tests-backend/build/reports/problems/problems-report.html Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0. You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins. For more on this, please refer to https://docs.gradle.org/8.13/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation. BUILD SUCCESSFUL in 1h 23m 28s 15 actionable tasks: 3 executed, 12 up-to-date make: Leaving directory '/go/src/github.com/stackrox/stackrox/qa-tests-backend' INFO: Fri Oct 31 05:55:25 UTC 2025: Skipping the workload identity cleanup. INFO: Fri Oct 31 05:55:25 UTC 2025: Copying qa-tests-backend results to part-1-tests INFO: Fri Oct 31 05:55:25 UTC 2025: Copying test results from qa-tests-backend/build/test-results/testBegin to part-1-tests INFO: Fri Oct 31 05:55:25 UTC 2025: Copying test results from qa-tests-backend/build/test-results/testParallel to part-1-tests INFO: Fri Oct 31 05:55:25 UTC 2025: Copying test results from qa-tests-backend/build/test-results/testRest to part-1-tests **** **** 05:55:25: test completed [QA tests part I] **** **** **** 05:55:25: About to run post test [QA tests part I] **** 05:55:25: Running post command: ['scripts/ci/collect-collector-metrics.sh', 'stackrox', '/tmp/collector-metrics'] . set up port-forwarding from collector-cmgmb:9090 to localhost:9090 finished download collector-cmgmb.txt finished tear down of port-forwarding from collector-cmgmb:9090 to localhost:9090 . set up port-forwarding from collector-dnv9p:9090 to localhost:9090 finished download collector-dnv9p.txt finished tear down of port-forwarding from collector-dnv9p:9090 to localhost:9090 . set up port-forwarding from collector-nhmnm:9090 to localhost:9090 finished download collector-nhmnm.txt finished tear down of port-forwarding from collector-nhmnm:9090 to localhost:9090 . set up port-forwarding from collector-pj5kz:9090 to localhost:9090 finished download collector-pj5kz.txt finished tear down of port-forwarding from collector-pj5kz:9090 to localhost:9090 . set up port-forwarding from collector-s9bvx:9090 to localhost:9090 finished download collector-s9bvx.txt finished tear down of port-forwarding from collector-s9bvx:9090 to localhost:9090 . set up port-forwarding from collector-v2g62:9090 to localhost:9090 finished download collector-v2g62.txt finished tear down of port-forwarding from collector-v2g62:9090 to localhost:9090 05:55:56: Running post command: ['tests/e2e/lib.sh', 'wait_for_api'] INFO: Fri Oct 31 05:55:56 UTC 2025: Waiting for Central to be ready in namespace stackrox INFO: Fri Oct 31 05:55:56 UTC 2025: Waiting 600s (increased for openshift-ci provisioned clusters) for central api and 3600 for ingress... INFO: Fri Oct 31 05:55:56 UTC 2025: Waiting for deployment central to be ready in namespace stackrox INFO: Fri Oct 31 05:56:06 UTC 2025: Deployment central is ready in namespace stackrox. INFO: Fri Oct 31 05:56:06 UTC 2025: Central deployment is ready in namespace stackrox. INFO: Fri Oct 31 05:56:06 UTC 2025: Waiting for Central API endpoint INFO: Fri Oct 31 05:56:07 UTC 2025: Found ingress endpoint: a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com INFO: Fri Oct 31 05:56:07 UTC 2025: Attempting to get 6 'ok' responses in a row from https://a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com:443/v1/ping INFO: Fri Oct 31 05:56:07 UTC 2025: Status is now: ok INFO: Fri Oct 31 05:56:09 UTC 2025: Status is now: ok INFO: Fri Oct 31 05:56:11 UTC 2025: Status is now: ok INFO: Fri Oct 31 05:56:13 UTC 2025: Status is now: ok INFO: Fri Oct 31 05:56:15 UTC 2025: Status is now: ok 05:56:17: Running post command: ['scripts/ci/lib.sh', 'get_central_debug_dump', 'debug-dump'] INFO: Fri Oct 31 05:56:17 UTC 2025: Getting a central debug dump INFO: Retrieving debug metrics. This may take a couple of minutes... INFO: Successfully wrote debug zip file to "debug-dump/stackrox_debug_2025_10_31_05_56_17.zip" total 800 -rw-r--r--. 1 1001050000 root 815422 Oct 31 05:56 stackrox_debug_2025_10_31_05_56_17.zip 05:56:47: Running post command: ['scripts/ci/lib.sh', 'process_central_metrics', 'debug-dump'] INFO: Fri Oct 31 05:56:47 UTC 2025: Processing metrics from central debug dump go: downloading github.com/stackrox/prometheus-metric-parser v0.0.0-20240718111853-be492d554cd5 go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20240610135401-a8a62080eff3 go: downloading cloud.google.com/go/monitoring v1.19.0 go: downloading golang.org/x/exp v0.0.0-20240604190554-fc45aab8b7f8 go: downloading github.com/spf13/cobra v1.8.0 go: downloading github.com/prometheus/prom2json v1.3.3 go: downloading github.com/prometheus/client_model v0.6.1 go: downloading google.golang.org/protobuf v1.34.2 go: downloading google.golang.org/genproto v0.0.0-20240610135401-a8a62080eff3 go: downloading github.com/prometheus/common v0.54.0 go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.4 go: downloading github.com/spf13/pflag v1.0.5 go: downloading github.com/googleapis/gax-go/v2 v2.12.4 go: downloading google.golang.org/api v0.183.0 go: downloading google.golang.org/grpc v1.64.1 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20240610135401-a8a62080eff3 go: downloading golang.org/x/time v0.5.0 go: downloading cloud.google.com/go/compute/metadata v0.3.0 go: downloading cloud.google.com/go/auth v0.5.1 go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.2 go: downloading go.opencensus.io v0.24.0 go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.52.0 go: downloading golang.org/x/sync v0.12.0 go: downloading github.com/google/s2a-go v0.1.7 go: downloading github.com/googleapis/enterprise-certificate-proxy v0.3.2 go: downloading go.opentelemetry.io/otel v1.27.0 go: downloading go.opentelemetry.io/otel/metric v1.27.0 go: downloading go.opentelemetry.io/otel/trace v1.27.0 go: downloading golang.org/x/crypto v0.36.0 go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da Usage: prometheus-metric-parser [command] Available Commands: compare Compare takes two metrics files and compares them takes all the metrics and outputs them as key value pairs. It will average histograms completion Generate the autocompletion script for the specified shell help Help about any command single Single takes all the metrics and outputs them as key value pairs. It will average histograms Flags: -h, --help help for prometheus-metric-parser Use "prometheus-metric-parser [command] --help" for more information about a command. INFO: Fri Oct 31 05:56:56 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json INFO: Fri Oct 31 05:56:57 UTC 2025: Saving Big Query test records from /tmp/tmp.5MCaurLmXW.csv to gs://stackrox-ci-artifacts/central-metrics/upload Copying file:///tmp/tmp.5MCaurLmXW.csv to gs://stackrox-ci-artifacts/central-metrics/upload/tmp.5MCaurLmXW.csv .. 05:56:59: Running post command: ['scripts/ci/lib.sh', 'get_central_diagnostics', 'diagnostic-bundle'] INFO: Fri Oct 31 05:56:59 UTC 2025: Getting central diagnostics INFO: Downloading diagnostic bundle... INFO: Successfully wrote diagnostic zip file to "diagnostic-bundle/stackrox_diagnostic_2025_10_31_05_56_59.zip" total 1928 -rw-r--r--. 1 1001050000 root 1971002 Oct 31 05:57 stackrox_diagnostic_2025_10_31_05_56_59.zip 05:57:20: Running post command: ['scripts/grab-data-from-central.sh', 'central-data'] 0.0 b [>>------------------------------------------------] 0.0 b/s central-data/postgres_db_2025_10_31_05_57_20.sql.zip 14.9 MiB [>>>------------------------------------------] 4.3 MiB/s central-data/postgres_db_2025_10_31_05_57_20.sql.zip Wrote backup file to "central-data/postgres_db_2025_10_31_05_57_20.sql.zip" Pulling StackRox policies Will pull 87 policies from StackRox 05:57:29: Running post command: ['scripts/ci/collect-service-logs.sh', 'stackrox', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE stackrox Active 92m INFO: Fri Oct 31 05:57:30 UTC 2025: >>> Collecting from namespace stackrox <<< INFO: Fri Oct 31 05:57:30 UTC 2025: >>> Collecting daemonsets from namespace stackrox <<< NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR collector 6 6 6 6 6 89m collector,compliance,node-inventory quay.io/rhacs-eng/collector:3.23.x-8-gec8a0b3bd7,quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6,quay.io/rhacs-eng/scanner-slim:2.37.x-112-gde9f7c100e service=collector INFO: Fri Oct 31 05:57:30 UTC 2025: >>> Collecting deployments from namespace stackrox <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR admission-control 3/3 3 3 89m admission-control quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6 app=admission-control central 1/1 1 1 92m central quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6 app=central central-db 1/1 1 1 92m central-db quay.io/rhacs-eng/central-db:4.10.x-207-g071f40eed6 app=central-db config-controller 1/1 1 1 92m manager quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6 app=config-controller scanner 1/1 1 1 92m scanner quay.io/rhacs-eng/scanner:2.37.x-112-gde9f7c100e app=scanner scanner-db 1/1 1 1 92m db quay.io/rhacs-eng/scanner-db:2.37.x-112-gde9f7c100e app=scanner-db sensor 1/1 1 1 89m sensor quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6 app=sensor webhookserver 1/1 1 1 89m webhookserver quay.io/rhacs-eng/qa-multi-arch:webhookserver-1.2 app=webhookserver INFO: Fri Oct 31 05:57:35 UTC 2025: >>> Collecting services from namespace stackrox <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR admission-control ClusterIP 172.30.19.69 443/TCP 90m app=admission-control central ClusterIP 172.30.45.18 443/TCP,9091/TCP 92m app=central central-db ClusterIP 172.30.22.117 5432/TCP 92m app=central-db central-loadbalancer LoadBalancer 172.30.184.127 a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com 443:31351/TCP 92m app=central scanner ClusterIP 172.30.30.4 8080/TCP,8443/TCP 92m app=scanner scanner-db ClusterIP 172.30.251.222 5432/TCP 92m app=scanner-db sensor ClusterIP 172.30.63.173 443/TCP,9091/TCP 90m app=sensor sensor-webhook ClusterIP 172.30.9.250 443/TCP 90m app=sensor webhookserver ClusterIP 172.30.145.22 8080/TCP,8443/TCP 89m app=webhookserver INFO: Fri Oct 31 05:57:41 UTC 2025: >>> Collecting pods from namespace stackrox <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES admission-control-7c9bf84889-ljwt9 1/1 Running 0 82m 10.129.2.40 ip-10-0-28-116.ec2.internal admission-control-7c9bf84889-qhbkl 1/1 Running 0 82m 10.128.2.29 ip-10-0-7-77.ec2.internal admission-control-7c9bf84889-tzjw7 1/1 Running 0 82m 10.131.0.53 ip-10-0-72-187.ec2.internal central-795644c465-msqhx 1/1 Running 0 92m 10.129.2.30 ip-10-0-28-116.ec2.internal central-db-84b98c8889-fzcq2 1/1 Running 0 92m 10.128.2.19 ip-10-0-7-77.ec2.internal collector-cmgmb 3/3 Running 0 89m 10.128.2.23 ip-10-0-7-77.ec2.internal collector-dnv9p 3/3 Running 0 89m 10.129.2.33 ip-10-0-28-116.ec2.internal collector-nhmnm 3/3 Running 0 89m 10.128.0.72 ip-10-0-119-203.ec2.internal collector-pj5kz 3/3 Running 0 89m 10.131.0.24 ip-10-0-72-187.ec2.internal collector-s9bvx 3/3 Running 0 89m 10.129.0.84 ip-10-0-52-51.ec2.internal collector-v2g62 3/3 Running 0 89m 10.130.0.93 ip-10-0-40-239.ec2.internal config-controller-5f68659754-56qpc 1/1 Running 0 92m 10.129.2.28 ip-10-0-28-116.ec2.internal scanner-7487f9cbb8-mchmc 1/1 Running 0 92m 10.131.0.21 ip-10-0-72-187.ec2.internal scanner-db-74f98cd84d-7sg42 1/1 Running 0 92m 10.129.2.29 ip-10-0-28-116.ec2.internal sensor-7b4784c4d5-r7xsl 1/1 Running 0 90m 10.128.2.20 ip-10-0-7-77.ec2.internal webhookserver-84f798856c-55slf 1/1 Running 0 89m 10.131.0.25 ip-10-0-72-187.ec2.internal INFO: Fri Oct 31 05:57:42 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-ljwt9 current container admission-control in stackrox... INFO: Fri Oct 31 05:57:42 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-ljwt9 current container init-tls-certs in stackrox... INFO: Fri Oct 31 05:57:43 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-qhbkl current container admission-control in stackrox... INFO: Fri Oct 31 05:57:43 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-qhbkl current container init-tls-certs in stackrox... INFO: Fri Oct 31 05:57:44 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-tzjw7 current container admission-control in stackrox... INFO: Fri Oct 31 05:57:44 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-tzjw7 current container init-tls-certs in stackrox... INFO: Fri Oct 31 05:57:45 UTC 2025: Dumping log of pods/central-795644c465-msqhx current container central in stackrox... INFO: Fri Oct 31 05:57:46 UTC 2025: Dumping log of pods/central-db-84b98c8889-fzcq2 current container central-db in stackrox... INFO: Fri Oct 31 05:57:46 UTC 2025: Dumping log of pods/central-db-84b98c8889-fzcq2 current container init-db in stackrox... INFO: Fri Oct 31 05:57:47 UTC 2025: Dumping log of pods/collector-cmgmb current container collector in stackrox... INFO: Fri Oct 31 05:57:47 UTC 2025: Dumping log of pods/collector-cmgmb current container compliance in stackrox... INFO: Fri Oct 31 05:57:47 UTC 2025: Dumping log of pods/collector-cmgmb current container node-inventory in stackrox... INFO: Fri Oct 31 05:57:48 UTC 2025: Dumping log of pods/collector-cmgmb current container init-tls-certs in stackrox... INFO: Fri Oct 31 05:57:49 UTC 2025: Dumping log of pods/collector-dnv9p current container collector in stackrox... INFO: Fri Oct 31 05:57:49 UTC 2025: Dumping log of pods/collector-dnv9p current container compliance in stackrox... INFO: Fri Oct 31 05:57:49 UTC 2025: Dumping log of pods/collector-dnv9p current container node-inventory in stackrox... INFO: Fri Oct 31 05:57:49 UTC 2025: Dumping log of pods/collector-dnv9p current container init-tls-certs in stackrox... INFO: Fri Oct 31 05:57:50 UTC 2025: Dumping log of pods/collector-nhmnm current container collector in stackrox... INFO: Fri Oct 31 05:57:50 UTC 2025: Dumping log of pods/collector-nhmnm current container compliance in stackrox... INFO: Fri Oct 31 05:57:51 UTC 2025: Dumping log of pods/collector-nhmnm current container node-inventory in stackrox... INFO: Fri Oct 31 05:57:51 UTC 2025: Dumping log of pods/collector-nhmnm current container init-tls-certs in stackrox... INFO: Fri Oct 31 05:57:52 UTC 2025: Dumping log of pods/collector-pj5kz current container collector in stackrox... INFO: Fri Oct 31 05:57:52 UTC 2025: Dumping log of pods/collector-pj5kz current container compliance in stackrox... INFO: Fri Oct 31 05:57:52 UTC 2025: Dumping log of pods/collector-pj5kz current container node-inventory in stackrox... INFO: Fri Oct 31 05:57:53 UTC 2025: Dumping log of pods/collector-pj5kz current container init-tls-certs in stackrox... INFO: Fri Oct 31 05:57:53 UTC 2025: Dumping log of pods/collector-s9bvx current container collector in stackrox... INFO: Fri Oct 31 05:57:54 UTC 2025: Dumping log of pods/collector-s9bvx current container compliance in stackrox... INFO: Fri Oct 31 05:57:54 UTC 2025: Dumping log of pods/collector-s9bvx current container node-inventory in stackrox... INFO: Fri Oct 31 05:57:54 UTC 2025: Dumping log of pods/collector-s9bvx current container init-tls-certs in stackrox... INFO: Fri Oct 31 05:57:55 UTC 2025: Dumping log of pods/collector-v2g62 current container collector in stackrox... INFO: Fri Oct 31 05:57:55 UTC 2025: Dumping log of pods/collector-v2g62 current container compliance in stackrox... INFO: Fri Oct 31 05:57:56 UTC 2025: Dumping log of pods/collector-v2g62 current container node-inventory in stackrox... INFO: Fri Oct 31 05:57:56 UTC 2025: Dumping log of pods/collector-v2g62 current container init-tls-certs in stackrox... INFO: Fri Oct 31 05:57:57 UTC 2025: Dumping log of pods/config-controller-5f68659754-56qpc current container manager in stackrox... INFO: Fri Oct 31 05:57:58 UTC 2025: Dumping log of pods/scanner-7487f9cbb8-mchmc current container scanner in stackrox... INFO: Fri Oct 31 05:57:58 UTC 2025: Dumping log of pods/scanner-db-74f98cd84d-7sg42 current container db in stackrox... INFO: Fri Oct 31 05:57:59 UTC 2025: Dumping log of pods/scanner-db-74f98cd84d-7sg42 current container init-db in stackrox... INFO: Fri Oct 31 05:58:00 UTC 2025: Dumping log of pods/sensor-7b4784c4d5-r7xsl current container sensor in stackrox... INFO: Fri Oct 31 05:58:00 UTC 2025: Dumping log of pods/sensor-7b4784c4d5-r7xsl current container crs in stackrox... INFO: Fri Oct 31 05:58:00 UTC 2025: Dumping log of pods/sensor-7b4784c4d5-r7xsl current container init-tls-certs in stackrox... INFO: Fri Oct 31 05:58:01 UTC 2025: Dumping log of pods/webhookserver-84f798856c-55slf current container webhookserver in stackrox... INFO: Fri Oct 31 05:58:01 UTC 2025: >>> Collecting secrets from namespace stackrox <<< NAME TYPE DATA AGE admission-control-dockercfg-p8bhn kubernetes.io/dockercfg 1 90m admission-control-tls Opaque 3 90m builder-dockercfg-df9sv kubernetes.io/dockercfg 1 93m central-admin-pass Opaque 1 93m central-db-dockercfg-75lrj kubernetes.io/dockercfg 1 92m central-db-password Opaque 1 92m central-db-tls Opaque 3 92m central-default-tls-secret kubernetes.io/tls 2 93m central-dockercfg-vfb6p kubernetes.io/dockercfg 1 92m central-htpasswd Opaque 1 92m central-monitoring-tls kubernetes.io/tls 2 92m central-stackrox-central-services-proxy-env Opaque 1 92m central-tls Opaque 5 92m collector-dockercfg-npd4p kubernetes.io/dockercfg 1 90m collector-tls Opaque 3 90m config-controller-dockercfg-c7wx7 kubernetes.io/dockercfg 1 92m default-dockercfg-g7xzt kubernetes.io/dockercfg 1 93m deployer-dockercfg-n4tck kubernetes.io/dockercfg 1 93m helm-cluster-config Opaque 1 90m scanner-db-password Opaque 1 92m scanner-db-tls Opaque 3 92m scanner-dockercfg-lvf9z kubernetes.io/dockercfg 1 92m scanner-tls Opaque 3 92m securedcluster-stackrox-secured-cluster-services-proxy-env Opaque 1 90m sensor-dockercfg-jr4kf kubernetes.io/dockercfg 1 90m sensor-monitoring-tls kubernetes.io/tls 2 90m sensor-tls Opaque 3 90m service-ca Opaque 1 90m sh.helm.release.v1.stackrox-central-services.v1 helm.sh/release.v1 1 92m sh.helm.release.v1.stackrox-secured-cluster-services.v1 helm.sh/release.v1 1 90m sh.helm.release.v1.webhookserver.v1 helm.sh/release.v1 1 89m stackrox kubernetes.io/dockerconfigjson 1 93m tls-cert-admission-control Opaque 3 90m tls-cert-collector Opaque 3 90m tls-cert-scanner Opaque 3 90m tls-cert-scanner-db Opaque 3 90m tls-cert-scanner-v4-db Opaque 3 90m tls-cert-scanner-v4-indexer Opaque 3 90m tls-cert-sensor Opaque 3 90m webhook-server-certs Opaque 2 89m INFO: Fri Oct 31 05:58:23 UTC 2025: >>> Collecting serviceaccounts from namespace stackrox <<< NAME SECRETS AGE admission-control 1 90m builder 1 93m central 1 93m central-db 1 93m collector 1 90m config-controller 1 93m default 1 93m deployer 1 93m scanner 1 93m sensor 1 90m INFO: Fri Oct 31 05:58:29 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace stackrox <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 117m autoscaling.openshift.io 2 134m cluster-baremetal-validating-webhook-configuration 1 134m controlplanemachineset.machine.openshift.io 1 131m machine-api 2 134m monitoringconfigmaps.openshift.io 1 115m multus.openshift.io 1 136m network-node-identity.openshift.io 2 119m performance-addon-operator 1 141m prometheusrules.openshift.io 1 117m stackrox 2 90m INFO: Fri Oct 31 05:58:37 UTC 2025: >>> Collecting catalogsources from namespace stackrox <<< No resources found in stackrox namespace. INFO: Fri Oct 31 05:58:37 UTC 2025: >>> Collecting subscriptions from namespace stackrox <<< No resources found in stackrox namespace. INFO: Fri Oct 31 05:58:37 UTC 2025: >>> Collecting clusterserviceversions from namespace stackrox <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 05:58:38 UTC 2025: >>> Collecting central from namespace stackrox <<< NAME AGE stackrox-central-services 93m INFO: Fri Oct 31 05:58:39 UTC 2025: >>> Collecting securedclusters from namespace stackrox <<< NAME AGE stackrox-secured-cluster-services 91m INFO: Fri Oct 31 05:58:40 UTC 2025: >>> Collecting nodes from namespace stackrox <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 139m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 118m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 139m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 139m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 118m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 118m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 05:58:46: Running post command: ['scripts/ci/collect-service-logs.sh', 'stackrox-operator', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE stackrox-operator Active 94m INFO: Fri Oct 31 05:58:46 UTC 2025: >>> Collecting from namespace stackrox-operator <<< INFO: Fri Oct 31 05:58:46 UTC 2025: >>> Collecting daemonsets from namespace stackrox-operator <<< No resources found in stackrox-operator namespace. INFO: Fri Oct 31 05:58:46 UTC 2025: >>> Collecting deployments from namespace stackrox-operator <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR rhacs-operator-controller-manager 1/1 1 1 94m manager quay.io/rhacs-eng/stackrox-operator:4.10.0-207-g071f40eed6 app=rhacs-operator,control-plane=controller-manager INFO: Fri Oct 31 05:58:47 UTC 2025: >>> Collecting services from namespace stackrox-operator <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR rhacs-operator-controller-manager-metrics-service ClusterIP 172.30.22.238 8443/TCP 94m app=rhacs-operator,control-plane=controller-manager stackrox-operator-test-index ClusterIP 172.30.39.158 50051/TCP 94m olm.catalogSource=stackrox-operator-test-index,olm.managed=true INFO: Fri Oct 31 05:58:48 UTC 2025: >>> Collecting pods from namespace stackrox-operator <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES 2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq 0/1 Completed 0 94m 10.129.2.25 ip-10-0-28-116.ec2.internal rhacs-operator-controller-manager-7b9d48dc97-n6jrj 1/1 Running 0 94m 10.129.2.27 ip-10-0-28-116.ec2.internal stackrox-operator-test-index-q698h 1/1 Running 0 94m 10.129.2.24 ip-10-0-28-116.ec2.internal INFO: Fri Oct 31 05:58:49 UTC 2025: Dumping log of pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq current container extract in stackrox-operator... INFO: Fri Oct 31 05:58:50 UTC 2025: Dumping log of pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq current container util in stackrox-operator... INFO: Fri Oct 31 05:58:50 UTC 2025: Dumping log of pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq current container pull in stackrox-operator... INFO: Fri Oct 31 05:58:51 UTC 2025: Dumping log of pods/rhacs-operator-controller-manager-7b9d48dc97-n6jrj current container manager in stackrox-operator... INFO: Fri Oct 31 05:58:51 UTC 2025: Dumping log of pods/stackrox-operator-test-index-q698h current container registry-server in stackrox-operator... INFO: Fri Oct 31 05:58:52 UTC 2025: >>> Collecting secrets from namespace stackrox-operator <<< NAME TYPE DATA AGE builder-dockercfg-ldfjm kubernetes.io/dockercfg 1 95m default-dockercfg-hk546 kubernetes.io/dockercfg 1 95m deployer-dockercfg-d5lwg kubernetes.io/dockercfg 1 95m rhacs-operator-controller-manager-dockercfg-8tq26 kubernetes.io/dockercfg 1 94m stackrox-operator-test-index-dockercfg-k8tbd kubernetes.io/dockercfg 1 95m INFO: Fri Oct 31 05:58:55 UTC 2025: >>> Collecting serviceaccounts from namespace stackrox-operator <<< NAME SECRETS AGE builder 1 95m default 1 95m deployer 1 95m rhacs-operator-controller-manager 1 94m stackrox-operator-test-index 1 95m INFO: Fri Oct 31 05:58:57 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace stackrox-operator <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 118m autoscaling.openshift.io 2 135m cluster-baremetal-validating-webhook-configuration 1 135m controlplanemachineset.machine.openshift.io 1 132m machine-api 2 135m monitoringconfigmaps.openshift.io 1 116m multus.openshift.io 1 136m network-node-identity.openshift.io 2 120m performance-addon-operator 1 142m prometheusrules.openshift.io 1 118m stackrox 2 91m INFO: Fri Oct 31 05:59:05 UTC 2025: >>> Collecting catalogsources from namespace stackrox-operator <<< NAME DISPLAY TYPE PUBLISHER AGE stackrox-operator-test-index StackRox Operator Test index grpc 95m INFO: Fri Oct 31 05:59:05 UTC 2025: >>> Collecting subscriptions from namespace stackrox-operator <<< NAME PACKAGE SOURCE CHANNEL stackrox-operator-test-subscription rhacs-operator stackrox-operator-test-index latest INFO: Fri Oct 31 05:59:06 UTC 2025: >>> Collecting clusterserviceversions from namespace stackrox-operator <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 05:59:07 UTC 2025: >>> Collecting central from namespace stackrox-operator <<< No resources found in stackrox-operator namespace. INFO: Fri Oct 31 05:59:07 UTC 2025: >>> Collecting securedclusters from namespace stackrox-operator <<< No resources found in stackrox-operator namespace. INFO: Fri Oct 31 05:59:08 UTC 2025: >>> Collecting nodes from namespace stackrox-operator <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 139m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 119m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 139m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 139m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 119m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 119m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 05:59:14: Running post command: ['scripts/ci/collect-service-logs.sh', 'proxies', '/tmp/k8s-service-logs/part-1/k8s-logs'] Error from server (NotFound): namespaces "proxies" not found INFO: Fri Oct 31 05:59:14 UTC 2025: Skipping missing namespace proxies 05:59:14: Running post command: ['scripts/ci/collect-service-logs.sh', 'squid', '/tmp/k8s-service-logs/part-1/k8s-logs'] Error from server (NotFound): namespaces "squid" not found INFO: Fri Oct 31 05:59:14 UTC 2025: Skipping missing namespace squid 05:59:14: Running post command: ['scripts/ci/collect-service-logs.sh', 'kube-system', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE kube-system Active 144m INFO: Fri Oct 31 05:59:14 UTC 2025: >>> Collecting from namespace kube-system <<< INFO: Fri Oct 31 05:59:14 UTC 2025: >>> Collecting daemonsets from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 05:59:14 UTC 2025: >>> Collecting deployments from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 05:59:15 UTC 2025: >>> Collecting services from namespace kube-system <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR kubelet ClusterIP None 10250/TCP,10255/TCP,4194/TCP 118m INFO: Fri Oct 31 05:59:15 UTC 2025: >>> Collecting pods from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 05:59:16 UTC 2025: >>> Collecting secrets from namespace kube-system <<< NAME TYPE DATA AGE attachdetach-controller-dockercfg-zvdml kubernetes.io/dockercfg 1 123m aws-cloud-provider-dockercfg-llnl8 kubernetes.io/dockercfg 1 123m aws-creds Opaque 2 143m builder-dockercfg-5rr4n kubernetes.io/dockercfg 1 123m certificate-controller-dockercfg-4ts9j kubernetes.io/dockercfg 1 123m cloud-controller-manager-dockercfg-vcvql kubernetes.io/dockercfg 1 123m clusterrole-aggregation-controller-dockercfg-2d25d kubernetes.io/dockercfg 1 123m cronjob-controller-dockercfg-bwfcs kubernetes.io/dockercfg 1 123m daemon-set-controller-dockercfg-7rmq8 kubernetes.io/dockercfg 1 123m default-dockercfg-tqc2v kubernetes.io/dockercfg 1 123m deployer-dockercfg-5j8f4 kubernetes.io/dockercfg 1 123m deployment-controller-dockercfg-7zlhp kubernetes.io/dockercfg 1 123m disruption-controller-dockercfg-k4jbk kubernetes.io/dockercfg 1 123m endpoint-controller-dockercfg-hsjvf kubernetes.io/dockercfg 1 123m endpointslice-controller-dockercfg-ckxq9 kubernetes.io/dockercfg 1 123m endpointslicemirroring-controller-dockercfg-78tkf kubernetes.io/dockercfg 1 123m ephemeral-volume-controller-dockercfg-pj977 kubernetes.io/dockercfg 1 123m expand-controller-dockercfg-c7q6p kubernetes.io/dockercfg 1 123m generic-garbage-collector-dockercfg-k4nd7 kubernetes.io/dockercfg 1 123m horizontal-pod-autoscaler-dockercfg-jxc9l kubernetes.io/dockercfg 1 123m job-controller-dockercfg-6ggtw kubernetes.io/dockercfg 1 123m kube-cloud-cfg Opaque 1 143m kubeadmin Opaque 1 143m legacy-service-account-token-cleaner-dockercfg-4nmmn kubernetes.io/dockercfg 1 123m namespace-controller-dockercfg-8fvgf kubernetes.io/dockercfg 1 123m node-controller-dockercfg-knp2g kubernetes.io/dockercfg 1 123m persistent-volume-binder-dockercfg-cdn7t kubernetes.io/dockercfg 1 123m pod-garbage-collector-dockercfg-btkfm kubernetes.io/dockercfg 1 123m pv-protection-controller-dockercfg-csndt kubernetes.io/dockercfg 1 123m pvc-protection-controller-dockercfg-44w8f kubernetes.io/dockercfg 1 123m replicaset-controller-dockercfg-lrfp5 kubernetes.io/dockercfg 1 123m replication-controller-dockercfg-z7j2d kubernetes.io/dockercfg 1 123m resourcequota-controller-dockercfg-xlkzs kubernetes.io/dockercfg 1 123m root-ca-cert-publisher-dockercfg-v6666 kubernetes.io/dockercfg 1 123m selinux-warning-controller-dockercfg-jh2l9 kubernetes.io/dockercfg 1 123m service-account-controller-dockercfg-w88mk kubernetes.io/dockercfg 1 123m service-ca-cert-publisher-dockercfg-p6bbk kubernetes.io/dockercfg 1 123m service-cidrs-controller-dockercfg-zjjhc kubernetes.io/dockercfg 1 123m service-controller-dockercfg-dqxjf kubernetes.io/dockercfg 1 123m statefulset-controller-dockercfg-g78jw kubernetes.io/dockercfg 1 123m ttl-after-finished-controller-dockercfg-x8msd kubernetes.io/dockercfg 1 123m validatingadmissionpolicy-status-controller-dockercfg-f5l8m kubernetes.io/dockercfg 1 123m volumeattributesclass-protection-controller-dockercfg-z8c9t kubernetes.io/dockercfg 1 123m INFO: Fri Oct 31 05:59:39 UTC 2025: >>> Collecting serviceaccounts from namespace kube-system <<< NAME SECRETS AGE attachdetach-controller 1 144m aws-cloud-provider 1 139m builder 1 123m certificate-controller 1 144m cloud-controller-manager 1 142m clusterrole-aggregation-controller 1 144m cronjob-controller 1 144m daemon-set-controller 1 144m default 1 144m deployer 1 123m deployment-controller 1 144m disruption-controller 1 144m endpoint-controller 1 144m endpointslice-controller 1 144m endpointslicemirroring-controller 1 144m ephemeral-volume-controller 1 144m expand-controller 1 144m generic-garbage-collector 1 144m horizontal-pod-autoscaler 1 144m job-controller 1 144m legacy-service-account-token-cleaner 1 144m namespace-controller 1 144m node-controller 1 144m persistent-volume-binder 1 144m pod-garbage-collector 1 144m pv-protection-controller 1 144m pvc-protection-controller 1 144m replicaset-controller 1 144m replication-controller 1 144m resourcequota-controller 1 144m root-ca-cert-publisher 1 144m selinux-warning-controller 1 144m service-account-controller 1 144m service-ca-cert-publisher 1 144m service-cidrs-controller 1 144m service-controller 1 139m statefulset-controller 1 144m ttl-after-finished-controller 1 144m validatingadmissionpolicy-status-controller 1 144m volumeattributesclass-protection-controller 1 144m INFO: Fri Oct 31 06:00:05 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace kube-system <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 119m autoscaling.openshift.io 2 136m cluster-baremetal-validating-webhook-configuration 1 136m controlplanemachineset.machine.openshift.io 1 133m machine-api 2 136m monitoringconfigmaps.openshift.io 1 117m multus.openshift.io 1 137m network-node-identity.openshift.io 2 121m performance-addon-operator 1 143m prometheusrules.openshift.io 1 119m stackrox 2 92m INFO: Fri Oct 31 06:00:14 UTC 2025: >>> Collecting catalogsources from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 06:00:14 UTC 2025: >>> Collecting subscriptions from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 06:00:15 UTC 2025: >>> Collecting clusterserviceversions from namespace kube-system <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:00:16 UTC 2025: >>> Collecting central from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 06:00:16 UTC 2025: >>> Collecting securedclusters from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 06:00:16 UTC 2025: >>> Collecting nodes from namespace kube-system <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 140m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 120m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 140m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 140m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 120m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 120m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:00:22: Running post command: ['scripts/ci/collect-service-logs.sh', 'prefetch-images', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE prefetch-images Active 99m INFO: Fri Oct 31 06:00:22 UTC 2025: >>> Collecting from namespace prefetch-images <<< INFO: Fri Oct 31 06:00:22 UTC 2025: >>> Collecting daemonsets from namespace prefetch-images <<< NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR qa-e2e 6 6 6 6 6 99m sleep quay.io/stackrox-io/image-prefetcher:v0.3.0 app=qa-e2e stackrox-images 6 6 6 6 6 99m sleep quay.io/stackrox-io/image-prefetcher:v0.3.0 app=stackrox-images INFO: Fri Oct 31 06:00:23 UTC 2025: >>> Collecting deployments from namespace prefetch-images <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR qa-e2e-metrics 1/1 1 1 99m aggregator quay.io/stackrox-io/image-prefetcher:v0.3.0 app=qa-e2e-metrics stackrox-images-metrics 1/1 1 1 99m aggregator quay.io/stackrox-io/image-prefetcher:v0.3.0 app=stackrox-images-metrics INFO: Fri Oct 31 06:00:25 UTC 2025: >>> Collecting services from namespace prefetch-images <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR qa-e2e-metrics LoadBalancer 172.30.165.76 adc5586cf63b748c2b5b3325581d43b1-1302466646.XXXXXXXXX.elb.amazonaws.com 8443:32301/TCP,8080:30967/TCP 99m app=qa-e2e-metrics stackrox-images-metrics LoadBalancer 172.30.232.18 a9a8f0083eb3e4e4bb05c239b9718906-1196744389.XXXXXXXXX.elb.amazonaws.com 8443:30366/TCP,8080:30746/TCP 99m app=stackrox-images-metrics INFO: Fri Oct 31 06:00:26 UTC 2025: >>> Collecting pods from namespace prefetch-images <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES qa-e2e-2k5lw 1/1 Running 0 99m 10.131.0.19 ip-10-0-72-187.ec2.internal qa-e2e-4s8tw 1/1 Running 0 99m 10.128.0.69 ip-10-0-119-203.ec2.internal qa-e2e-72nmb 1/1 Running 0 99m 10.129.0.79 ip-10-0-52-51.ec2.internal qa-e2e-hp2qk 1/1 Running 0 99m 10.130.0.90 ip-10-0-40-239.ec2.internal qa-e2e-hwkkq 1/1 Running 0 99m 10.129.2.20 ip-10-0-28-116.ec2.internal qa-e2e-metrics-7fdf959548-7g84w 1/1 Running 0 99m 10.129.2.19 ip-10-0-28-116.ec2.internal qa-e2e-wb7f5 1/1 Running 0 99m 10.128.2.17 ip-10-0-7-77.ec2.internal stackrox-images-6rqv9 1/1 Running 0 99m 10.128.0.70 ip-10-0-119-203.ec2.internal stackrox-images-bqn6c 1/1 Running 0 99m 10.129.2.22 ip-10-0-28-116.ec2.internal stackrox-images-hcczx 1/1 Running 0 99m 10.128.2.18 ip-10-0-7-77.ec2.internal stackrox-images-lhrlk 1/1 Running 0 99m 10.131.0.20 ip-10-0-72-187.ec2.internal stackrox-images-metrics-8d848757-98ctr 1/1 Running 0 99m 10.129.2.21 ip-10-0-28-116.ec2.internal stackrox-images-pvqkv 1/1 Running 0 99m 10.130.0.91 ip-10-0-40-239.ec2.internal stackrox-images-xl9cv 1/1 Running 0 99m 10.129.0.80 ip-10-0-52-51.ec2.internal INFO: Fri Oct 31 06:00:27 UTC 2025: Dumping log of pods/qa-e2e-2k5lw current container sleep in prefetch-images... INFO: Fri Oct 31 06:00:27 UTC 2025: Dumping log of pods/qa-e2e-2k5lw current container prefetch in prefetch-images... INFO: Fri Oct 31 06:00:28 UTC 2025: Dumping log of pods/qa-e2e-4s8tw current container sleep in prefetch-images... INFO: Fri Oct 31 06:00:28 UTC 2025: Dumping log of pods/qa-e2e-4s8tw current container prefetch in prefetch-images... INFO: Fri Oct 31 06:00:29 UTC 2025: Dumping log of pods/qa-e2e-72nmb current container sleep in prefetch-images... INFO: Fri Oct 31 06:00:29 UTC 2025: Dumping log of pods/qa-e2e-72nmb current container prefetch in prefetch-images... INFO: Fri Oct 31 06:00:30 UTC 2025: Dumping log of pods/qa-e2e-hp2qk current container sleep in prefetch-images... INFO: Fri Oct 31 06:00:30 UTC 2025: Dumping log of pods/qa-e2e-hp2qk current container prefetch in prefetch-images... INFO: Fri Oct 31 06:00:31 UTC 2025: Dumping log of pods/qa-e2e-hwkkq current container sleep in prefetch-images... INFO: Fri Oct 31 06:00:31 UTC 2025: Dumping log of pods/qa-e2e-hwkkq current container prefetch in prefetch-images... INFO: Fri Oct 31 06:00:32 UTC 2025: Dumping log of pods/qa-e2e-metrics-7fdf959548-7g84w current container aggregator in prefetch-images... INFO: Fri Oct 31 06:00:33 UTC 2025: Dumping log of pods/qa-e2e-wb7f5 current container sleep in prefetch-images... INFO: Fri Oct 31 06:00:33 UTC 2025: Dumping log of pods/qa-e2e-wb7f5 current container prefetch in prefetch-images... INFO: Fri Oct 31 06:00:34 UTC 2025: Dumping log of pods/stackrox-images-6rqv9 current container sleep in prefetch-images... INFO: Fri Oct 31 06:00:34 UTC 2025: Dumping log of pods/stackrox-images-6rqv9 current container prefetch in prefetch-images... INFO: Fri Oct 31 06:00:35 UTC 2025: Dumping log of pods/stackrox-images-bqn6c current container sleep in prefetch-images... INFO: Fri Oct 31 06:00:35 UTC 2025: Dumping log of pods/stackrox-images-bqn6c current container prefetch in prefetch-images... INFO: Fri Oct 31 06:00:36 UTC 2025: Dumping log of pods/stackrox-images-hcczx current container sleep in prefetch-images... INFO: Fri Oct 31 06:00:36 UTC 2025: Dumping log of pods/stackrox-images-hcczx current container prefetch in prefetch-images... INFO: Fri Oct 31 06:00:37 UTC 2025: Dumping log of pods/stackrox-images-lhrlk current container sleep in prefetch-images... INFO: Fri Oct 31 06:00:37 UTC 2025: Dumping log of pods/stackrox-images-lhrlk current container prefetch in prefetch-images... INFO: Fri Oct 31 06:00:38 UTC 2025: Dumping log of pods/stackrox-images-metrics-8d848757-98ctr current container aggregator in prefetch-images... INFO: Fri Oct 31 06:00:38 UTC 2025: Dumping log of pods/stackrox-images-pvqkv current container sleep in prefetch-images... INFO: Fri Oct 31 06:00:39 UTC 2025: Dumping log of pods/stackrox-images-pvqkv current container prefetch in prefetch-images... INFO: Fri Oct 31 06:00:39 UTC 2025: Dumping log of pods/stackrox-images-xl9cv current container sleep in prefetch-images... INFO: Fri Oct 31 06:00:40 UTC 2025: Dumping log of pods/stackrox-images-xl9cv current container prefetch in prefetch-images... INFO: Fri Oct 31 06:00:40 UTC 2025: >>> Collecting secrets from namespace prefetch-images <<< NAME TYPE DATA AGE builder-dockercfg-tlkdx kubernetes.io/dockercfg 1 100m default-dockercfg-4rgn5 kubernetes.io/dockercfg 1 100m deployer-dockercfg-c78n5 kubernetes.io/dockercfg 1 100m stackrox kubernetes.io/dockerconfigjson 1 100m INFO: Fri Oct 31 06:00:42 UTC 2025: >>> Collecting serviceaccounts from namespace prefetch-images <<< NAME SECRETS AGE builder 1 100m default 1 100m deployer 1 100m INFO: Fri Oct 31 06:00:44 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace prefetch-images <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 119m autoscaling.openshift.io 2 137m cluster-baremetal-validating-webhook-configuration 1 137m controlplanemachineset.machine.openshift.io 1 134m machine-api 2 137m monitoringconfigmaps.openshift.io 1 117m multus.openshift.io 1 138m network-node-identity.openshift.io 2 121m performance-addon-operator 1 144m prometheusrules.openshift.io 1 119m stackrox 2 93m INFO: Fri Oct 31 06:00:52 UTC 2025: >>> Collecting catalogsources from namespace prefetch-images <<< No resources found in prefetch-images namespace. INFO: Fri Oct 31 06:00:52 UTC 2025: >>> Collecting subscriptions from namespace prefetch-images <<< No resources found in prefetch-images namespace. INFO: Fri Oct 31 06:00:52 UTC 2025: >>> Collecting clusterserviceversions from namespace prefetch-images <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:00:53 UTC 2025: >>> Collecting central from namespace prefetch-images <<< No resources found in prefetch-images namespace. INFO: Fri Oct 31 06:00:53 UTC 2025: >>> Collecting securedclusters from namespace prefetch-images <<< No resources found in prefetch-images namespace. INFO: Fri Oct 31 06:00:54 UTC 2025: >>> Collecting nodes from namespace prefetch-images <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 141m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 121m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 141m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 141m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 121m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 121m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:01:00: Running post command: ['scripts/ci/collect-service-logs.sh', 'default', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE default Active 146m INFO: Fri Oct 31 06:01:00 UTC 2025: >>> Collecting from namespace default <<< INFO: Fri Oct 31 06:01:00 UTC 2025: >>> Collecting daemonsets from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:01:01 UTC 2025: >>> Collecting deployments from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:01:01 UTC 2025: >>> Collecting services from namespace default <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR kubernetes ClusterIP 172.30.0.1 443/TCP 146m openshift ExternalName kubernetes.default.svc.cluster.local 137m INFO: Fri Oct 31 06:01:02 UTC 2025: >>> Collecting pods from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:01:03 UTC 2025: >>> Collecting secrets from namespace default <<< NAME TYPE DATA AGE builder-dockercfg-2n29b kubernetes.io/dockercfg 1 124m default-dockercfg-jdzpj kubernetes.io/dockercfg 1 124m deployer-dockercfg-57xth kubernetes.io/dockercfg 1 124m INFO: Fri Oct 31 06:01:05 UTC 2025: >>> Collecting serviceaccounts from namespace default <<< NAME SECRETS AGE builder 1 124m default 1 145m deployer 1 124m INFO: Fri Oct 31 06:01:07 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace default <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 120m autoscaling.openshift.io 2 137m cluster-baremetal-validating-webhook-configuration 1 137m controlplanemachineset.machine.openshift.io 1 134m machine-api 2 137m monitoringconfigmaps.openshift.io 1 118m multus.openshift.io 1 138m network-node-identity.openshift.io 2 122m performance-addon-operator 1 144m prometheusrules.openshift.io 1 120m stackrox 2 93m INFO: Fri Oct 31 06:01:16 UTC 2025: >>> Collecting catalogsources from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:01:16 UTC 2025: >>> Collecting subscriptions from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:01:16 UTC 2025: >>> Collecting clusterserviceversions from namespace default <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:01:17 UTC 2025: >>> Collecting central from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:01:17 UTC 2025: >>> Collecting securedclusters from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:01:18 UTC 2025: >>> Collecting nodes from namespace default <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 141m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 121m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 142m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 141m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 121m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 121m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:01:24: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-dns', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-dns Active 137m INFO: Fri Oct 31 06:01:24 UTC 2025: >>> Collecting from namespace openshift-dns <<< INFO: Fri Oct 31 06:01:24 UTC 2025: >>> Collecting daemonsets from namespace openshift-dns <<< NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR dns-default 6 6 6 6 6 kubernetes.io/os=linux 137m dns,kube-rbac-proxy quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d880ec2bc1f2e70d60c1fc91af0fedb8ff2ee5261ead5356efa60c95d3ee5d6,quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:259964b66399bb8639633b6015a56f69535ce6569b99e3a913296566e4ee860d dns.operator.openshift.io/daemonset-dns=default node-resolver 6 6 6 6 6 kubernetes.io/os=linux 137m dns-node-resolver quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:491b7215b2ffbdeba1fed69677c0955dc653d109c0ec55f9b980597842d1654c dns.operator.openshift.io/daemonset-node-resolver= INFO: Fri Oct 31 06:01:26 UTC 2025: >>> Collecting deployments from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Fri Oct 31 06:01:26 UTC 2025: >>> Collecting services from namespace openshift-dns <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR dns-default ClusterIP 172.30.0.10 53/UDP,53/TCP,9154/TCP 137m dns.operator.openshift.io/daemonset-dns=default INFO: Fri Oct 31 06:01:27 UTC 2025: >>> Collecting pods from namespace openshift-dns <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES dns-default-5g8pg 2/2 Running 0 120m 10.129.2.13 ip-10-0-28-116.ec2.internal dns-default-7xm8x 2/2 Running 0 120m 10.128.2.6 ip-10-0-7-77.ec2.internal dns-default-ncbxz 2/2 Running 0 137m 10.129.0.10 ip-10-0-52-51.ec2.internal dns-default-nttfc 2/2 Running 0 120m 10.131.0.10 ip-10-0-72-187.ec2.internal dns-default-qs2bx 2/2 Running 0 137m 10.128.0.14 ip-10-0-119-203.ec2.internal dns-default-wkz9f 2/2 Running 0 137m 10.130.0.47 ip-10-0-40-239.ec2.internal node-resolver-2kkpw 1/1 Running 0 121m 10.0.28.116 ip-10-0-28-116.ec2.internal node-resolver-2zg7g 1/1 Running 0 121m 10.0.72.187 ip-10-0-72-187.ec2.internal node-resolver-4khpf 1/1 Running 0 137m 10.0.52.51 ip-10-0-52-51.ec2.internal node-resolver-ctldt 1/1 Running 0 137m 10.0.40.239 ip-10-0-40-239.ec2.internal node-resolver-pdnsn 1/1 Running 0 121m 10.0.7.77 ip-10-0-7-77.ec2.internal node-resolver-sh6p8 1/1 Running 0 137m 10.0.119.203 ip-10-0-119-203.ec2.internal INFO: Fri Oct 31 06:01:27 UTC 2025: Dumping log of pods/dns-default-5g8pg current container dns in openshift-dns... INFO: Fri Oct 31 06:01:27 UTC 2025: Dumping log of pods/dns-default-5g8pg current container kube-rbac-proxy in openshift-dns... INFO: Fri Oct 31 06:01:28 UTC 2025: Dumping log of pods/dns-default-7xm8x current container dns in openshift-dns... INFO: Fri Oct 31 06:01:29 UTC 2025: Dumping log of pods/dns-default-7xm8x current container kube-rbac-proxy in openshift-dns... INFO: Fri Oct 31 06:01:29 UTC 2025: Dumping log of pods/dns-default-ncbxz current container dns in openshift-dns... INFO: Fri Oct 31 06:01:30 UTC 2025: Dumping log of pods/dns-default-ncbxz current container kube-rbac-proxy in openshift-dns... INFO: Fri Oct 31 06:01:30 UTC 2025: Dumping log of pods/dns-default-nttfc current container dns in openshift-dns... INFO: Fri Oct 31 06:01:31 UTC 2025: Dumping log of pods/dns-default-nttfc current container kube-rbac-proxy in openshift-dns... INFO: Fri Oct 31 06:01:32 UTC 2025: Dumping log of pods/dns-default-qs2bx current container dns in openshift-dns... INFO: Fri Oct 31 06:01:32 UTC 2025: Dumping log of pods/dns-default-qs2bx current container kube-rbac-proxy in openshift-dns... INFO: Fri Oct 31 06:01:33 UTC 2025: Dumping log of pods/dns-default-wkz9f current container dns in openshift-dns... INFO: Fri Oct 31 06:01:33 UTC 2025: Dumping log of pods/dns-default-wkz9f current container kube-rbac-proxy in openshift-dns... INFO: Fri Oct 31 06:01:34 UTC 2025: Dumping log of pods/node-resolver-2kkpw current container dns-node-resolver in openshift-dns... INFO: Fri Oct 31 06:01:35 UTC 2025: Dumping log of pods/node-resolver-2zg7g current container dns-node-resolver in openshift-dns... INFO: Fri Oct 31 06:01:35 UTC 2025: Dumping log of pods/node-resolver-4khpf current container dns-node-resolver in openshift-dns... INFO: Fri Oct 31 06:01:36 UTC 2025: Dumping log of pods/node-resolver-ctldt current container dns-node-resolver in openshift-dns... INFO: Fri Oct 31 06:01:37 UTC 2025: Dumping log of pods/node-resolver-pdnsn current container dns-node-resolver in openshift-dns... INFO: Fri Oct 31 06:01:38 UTC 2025: Dumping log of pods/node-resolver-sh6p8 current container dns-node-resolver in openshift-dns... INFO: Fri Oct 31 06:01:38 UTC 2025: >>> Collecting secrets from namespace openshift-dns <<< NAME TYPE DATA AGE builder-dockercfg-mn5dk kubernetes.io/dockercfg 1 125m default-dockercfg-cg7v9 kubernetes.io/dockercfg 1 125m deployer-dockercfg-74sjc kubernetes.io/dockercfg 1 125m dns-default-metrics-tls kubernetes.io/tls 2 137m dns-dockercfg-p8lt7 kubernetes.io/dockercfg 1 125m node-resolver-dockercfg-kp4t8 kubernetes.io/dockercfg 1 125m INFO: Fri Oct 31 06:01:41 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-dns <<< NAME SECRETS AGE builder 1 125m default 1 138m deployer 1 125m dns 1 138m node-resolver 1 138m INFO: Fri Oct 31 06:01:44 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-dns <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 120m autoscaling.openshift.io 2 138m cluster-baremetal-validating-webhook-configuration 1 138m controlplanemachineset.machine.openshift.io 1 135m machine-api 2 138m monitoringconfigmaps.openshift.io 1 118m multus.openshift.io 1 139m network-node-identity.openshift.io 2 122m performance-addon-operator 1 145m prometheusrules.openshift.io 1 120m stackrox 2 94m INFO: Fri Oct 31 06:01:52 UTC 2025: >>> Collecting catalogsources from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Fri Oct 31 06:01:52 UTC 2025: >>> Collecting subscriptions from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Fri Oct 31 06:01:52 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-dns <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:01:53 UTC 2025: >>> Collecting central from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Fri Oct 31 06:01:53 UTC 2025: >>> Collecting securedclusters from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Fri Oct 31 06:01:53 UTC 2025: >>> Collecting nodes from namespace openshift-dns <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 142m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 122m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 142m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 142m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 122m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 122m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:01:59: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-apiserver', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-apiserver Active 138m INFO: Fri Oct 31 06:01:59 UTC 2025: >>> Collecting from namespace openshift-apiserver <<< INFO: Fri Oct 31 06:01:59 UTC 2025: >>> Collecting daemonsets from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Fri Oct 31 06:02:00 UTC 2025: >>> Collecting deployments from namespace openshift-apiserver <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR apiserver 3/3 3 3 138m openshift-apiserver,openshift-apiserver-check-endpoints quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb38700fc135a88ace2ec6d0a0e6da09dcfe783b599dfaa086f8fbc08696c2a5,quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:33260e735d30c8f9e69e282c4f357529628caa01d865fdf2272cc7397a94270f apiserver=true,app=openshift-apiserver-a INFO: Fri Oct 31 06:02:01 UTC 2025: >>> Collecting services from namespace openshift-apiserver <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR api ClusterIP 172.30.246.179 443/TCP 138m apiserver=true check-endpoints ClusterIP 172.30.48.233 17698/TCP 138m apiserver=true INFO: Fri Oct 31 06:02:02 UTC 2025: >>> Collecting pods from namespace openshift-apiserver <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES apiserver-65db4b4787-24s6x 2/2 Running 0 115m 10.130.0.87 ip-10-0-40-239.ec2.internal apiserver-65db4b4787-66628 2/2 Running 0 113m 10.129.0.73 ip-10-0-52-51.ec2.internal apiserver-65db4b4787-dqbkk 2/2 Running 0 116m 10.128.0.66 ip-10-0-119-203.ec2.internal INFO: Fri Oct 31 06:02:03 UTC 2025: Dumping log of pods/apiserver-65db4b4787-24s6x current container openshift-apiserver in openshift-apiserver... INFO: Fri Oct 31 06:02:03 UTC 2025: Dumping log of pods/apiserver-65db4b4787-24s6x current container openshift-apiserver-check-endpoints in openshift-apiserver... INFO: Fri Oct 31 06:02:03 UTC 2025: Dumping log of pods/apiserver-65db4b4787-24s6x current container fix-audit-permissions in openshift-apiserver... INFO: Fri Oct 31 06:02:04 UTC 2025: Dumping log of pods/apiserver-65db4b4787-66628 current container openshift-apiserver in openshift-apiserver... INFO: Fri Oct 31 06:02:04 UTC 2025: Dumping log of pods/apiserver-65db4b4787-66628 current container openshift-apiserver-check-endpoints in openshift-apiserver... INFO: Fri Oct 31 06:02:05 UTC 2025: Dumping log of pods/apiserver-65db4b4787-66628 current container fix-audit-permissions in openshift-apiserver... INFO: Fri Oct 31 06:02:05 UTC 2025: Dumping log of pods/apiserver-65db4b4787-dqbkk current container openshift-apiserver in openshift-apiserver... INFO: Fri Oct 31 06:02:06 UTC 2025: Dumping log of pods/apiserver-65db4b4787-dqbkk current container openshift-apiserver-check-endpoints in openshift-apiserver... INFO: Fri Oct 31 06:02:06 UTC 2025: Dumping log of pods/apiserver-65db4b4787-dqbkk current container fix-audit-permissions in openshift-apiserver... INFO: Fri Oct 31 06:02:06 UTC 2025: >>> Collecting secrets from namespace openshift-apiserver <<< NAME TYPE DATA AGE builder-dockercfg-vhrn6 kubernetes.io/dockercfg 1 125m default-dockercfg-ghcts kubernetes.io/dockercfg 1 125m deployer-dockercfg-gptsd kubernetes.io/dockercfg 1 125m etcd-client kubernetes.io/tls 2 138m openshift-apiserver-sa-dockercfg-v8mlz kubernetes.io/dockercfg 1 125m serving-cert kubernetes.io/tls 2 138m INFO: Fri Oct 31 06:02:10 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-apiserver <<< NAME SECRETS AGE builder 1 125m default 1 139m deployer 1 125m openshift-apiserver-sa 1 138m INFO: Fri Oct 31 06:02:12 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-apiserver <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 121m autoscaling.openshift.io 2 138m cluster-baremetal-validating-webhook-configuration 1 138m controlplanemachineset.machine.openshift.io 1 135m machine-api 2 138m monitoringconfigmaps.openshift.io 1 119m multus.openshift.io 1 140m network-node-identity.openshift.io 2 123m performance-addon-operator 1 145m prometheusrules.openshift.io 1 121m stackrox 2 94m INFO: Fri Oct 31 06:02:19 UTC 2025: >>> Collecting catalogsources from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Fri Oct 31 06:02:19 UTC 2025: >>> Collecting subscriptions from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Fri Oct 31 06:02:20 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-apiserver <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:02:21 UTC 2025: >>> Collecting central from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Fri Oct 31 06:02:21 UTC 2025: >>> Collecting securedclusters from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Fri Oct 31 06:02:21 UTC 2025: >>> Collecting nodes from namespace openshift-apiserver <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 143m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 122m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 143m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 143m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 122m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 122m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:02:27: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-authentication', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-authentication Active 139m INFO: Fri Oct 31 06:02:27 UTC 2025: >>> Collecting from namespace openshift-authentication <<< INFO: Fri Oct 31 06:02:27 UTC 2025: >>> Collecting daemonsets from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Fri Oct 31 06:02:27 UTC 2025: >>> Collecting deployments from namespace openshift-authentication <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR oauth-openshift 3/3 3 3 121m oauth-openshift quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bc5ea206be1759578ed058c6ab20025614dcb70cbeace99acfb72b349170468e app=oauth-openshift INFO: Fri Oct 31 06:02:28 UTC 2025: >>> Collecting services from namespace openshift-authentication <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR oauth-openshift ClusterIP 172.30.89.84 443/TCP 138m app=oauth-openshift INFO: Fri Oct 31 06:02:29 UTC 2025: >>> Collecting pods from namespace openshift-authentication <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES oauth-openshift-86f58ccd9-2mr7g 1/1 Running 0 121m 10.129.0.62 ip-10-0-52-51.ec2.internal oauth-openshift-86f58ccd9-cm656 1/1 Running 0 121m 10.128.0.56 ip-10-0-119-203.ec2.internal oauth-openshift-86f58ccd9-rfb7j 1/1 Running 0 121m 10.130.0.76 ip-10-0-40-239.ec2.internal INFO: Fri Oct 31 06:02:30 UTC 2025: Dumping log of pods/oauth-openshift-86f58ccd9-2mr7g current container oauth-openshift in openshift-authentication... INFO: Fri Oct 31 06:02:31 UTC 2025: Dumping log of pods/oauth-openshift-86f58ccd9-cm656 current container oauth-openshift in openshift-authentication... INFO: Fri Oct 31 06:02:31 UTC 2025: Dumping log of pods/oauth-openshift-86f58ccd9-rfb7j current container oauth-openshift in openshift-authentication... INFO: Fri Oct 31 06:02:32 UTC 2025: >>> Collecting secrets from namespace openshift-authentication <<< NAME TYPE DATA AGE builder-dockercfg-v8zqj kubernetes.io/dockercfg 1 126m default-dockercfg-vxdd4 kubernetes.io/dockercfg 1 126m deployer-dockercfg-dznrg kubernetes.io/dockercfg 1 126m oauth-openshift-dockercfg-7vr7j kubernetes.io/dockercfg 1 126m v4-0-config-system-ocp-branding-template Opaque 3 139m v4-0-config-system-router-certs Opaque 1 138m v4-0-config-system-serving-cert kubernetes.io/tls 2 139m v4-0-config-system-session Opaque 1 123m INFO: Fri Oct 31 06:02:37 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-authentication <<< NAME SECRETS AGE builder 1 126m default 1 139m deployer 1 126m oauth-openshift 1 139m INFO: Fri Oct 31 06:02:39 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-authentication <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 121m autoscaling.openshift.io 2 138m cluster-baremetal-validating-webhook-configuration 1 138m controlplanemachineset.machine.openshift.io 1 136m machine-api 2 138m monitoringconfigmaps.openshift.io 1 119m multus.openshift.io 1 140m network-node-identity.openshift.io 2 123m performance-addon-operator 1 146m prometheusrules.openshift.io 1 121m stackrox 2 95m INFO: Fri Oct 31 06:02:46 UTC 2025: >>> Collecting catalogsources from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Fri Oct 31 06:02:47 UTC 2025: >>> Collecting subscriptions from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Fri Oct 31 06:02:47 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-authentication <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:02:48 UTC 2025: >>> Collecting central from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Fri Oct 31 06:02:48 UTC 2025: >>> Collecting securedclusters from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Fri Oct 31 06:02:48 UTC 2025: >>> Collecting nodes from namespace openshift-authentication <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 143m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 122m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 143m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 143m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 122m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 122m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:02:54: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-etcd', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-etcd Active 147m INFO: Fri Oct 31 06:02:54 UTC 2025: >>> Collecting from namespace openshift-etcd <<< INFO: Fri Oct 31 06:02:54 UTC 2025: >>> Collecting daemonsets from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Fri Oct 31 06:02:54 UTC 2025: >>> Collecting deployments from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Fri Oct 31 06:02:54 UTC 2025: >>> Collecting services from namespace openshift-etcd <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR etcd ClusterIP 172.30.48.236 2379/TCP,2380/TCP,9978/TCP,9979/TCP,9980/TCP 147m etcd=true INFO: Fri Oct 31 06:02:55 UTC 2025: >>> Collecting pods from namespace openshift-etcd <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES etcd-guard-ip-10-0-119-203.ec2.internal 1/1 Running 0 138m 10.128.0.27 ip-10-0-119-203.ec2.internal etcd-guard-ip-10-0-40-239.ec2.internal 1/1 Running 0 129m 10.130.0.58 ip-10-0-40-239.ec2.internal etcd-guard-ip-10-0-52-51.ec2.internal 1/1 Running 0 125m 10.129.0.44 ip-10-0-52-51.ec2.internal etcd-ip-10-0-119-203.ec2.internal 5/5 Running 0 116m 10.0.119.203 ip-10-0-119-203.ec2.internal etcd-ip-10-0-40-239.ec2.internal 5/5 Running 0 113m 10.0.40.239 ip-10-0-40-239.ec2.internal etcd-ip-10-0-52-51.ec2.internal 5/5 Running 0 111m 10.0.52.51 ip-10-0-52-51.ec2.internal installer-5-ip-10-0-40-239.ec2.internal 0/1 Completed 0 128m 10.130.0.60 ip-10-0-40-239.ec2.internal installer-5-ip-10-0-52-51.ec2.internal 0/1 Completed 0 126m 10.129.0.40 ip-10-0-52-51.ec2.internal installer-7-ip-10-0-119-203.ec2.internal 0/1 Completed 0 122m 10.128.0.52 ip-10-0-119-203.ec2.internal installer-7-ip-10-0-40-239.ec2.internal 0/1 Completed 0 120m 10.130.0.79 ip-10-0-40-239.ec2.internal installer-7-ip-10-0-52-51.ec2.internal 0/1 Completed 0 124m 10.129.0.47 ip-10-0-52-51.ec2.internal installer-8-ip-10-0-119-203.ec2.internal 0/1 Completed 0 117m 10.128.0.64 ip-10-0-119-203.ec2.internal installer-8-ip-10-0-40-239.ec2.internal 0/1 Completed 0 114m 10.130.0.86 ip-10-0-40-239.ec2.internal installer-8-ip-10-0-52-51.ec2.internal 0/1 Completed 0 112m 10.129.0.74 ip-10-0-52-51.ec2.internal revision-pruner-7-ip-10-0-119-203.ec2.internal 0/1 Completed 0 117m 10.128.0.62 ip-10-0-119-203.ec2.internal revision-pruner-7-ip-10-0-40-239.ec2.internal 0/1 Completed 0 117m 10.130.0.83 ip-10-0-40-239.ec2.internal revision-pruner-7-ip-10-0-52-51.ec2.internal 0/1 Completed 0 117m 10.129.0.66 ip-10-0-52-51.ec2.internal revision-pruner-8-ip-10-0-119-203.ec2.internal 0/1 Completed 0 117m 10.128.0.63 ip-10-0-119-203.ec2.internal revision-pruner-8-ip-10-0-40-239.ec2.internal 0/1 Completed 0 117m 10.130.0.84 ip-10-0-40-239.ec2.internal revision-pruner-8-ip-10-0-52-51.ec2.internal 0/1 Completed 0 117m 10.129.0.67 ip-10-0-52-51.ec2.internal INFO: Fri Oct 31 06:02:56 UTC 2025: Dumping log of pods/etcd-guard-ip-10-0-119-203.ec2.internal current container guard in openshift-etcd... INFO: Fri Oct 31 06:02:57 UTC 2025: Dumping log of pods/etcd-guard-ip-10-0-40-239.ec2.internal current container guard in openshift-etcd... INFO: Fri Oct 31 06:02:57 UTC 2025: Dumping log of pods/etcd-guard-ip-10-0-52-51.ec2.internal current container guard in openshift-etcd... INFO: Fri Oct 31 06:02:58 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcd in openshift-etcd... INFO: Fri Oct 31 06:02:59 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcd-metrics in openshift-etcd... INFO: Fri Oct 31 06:02:59 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcd-readyz in openshift-etcd... INFO: Fri Oct 31 06:02:59 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcd-rev in openshift-etcd... INFO: Fri Oct 31 06:02:59 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcdctl in openshift-etcd... INFO: Fri Oct 31 06:03:00 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container setup in openshift-etcd... INFO: Fri Oct 31 06:03:00 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcd-ensure-env-vars in openshift-etcd... INFO: Fri Oct 31 06:03:00 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcd-resources-copy in openshift-etcd... INFO: Fri Oct 31 06:03:01 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcd in openshift-etcd... INFO: Fri Oct 31 06:03:01 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcd-metrics in openshift-etcd... INFO: Fri Oct 31 06:03:02 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcd-readyz in openshift-etcd... INFO: Fri Oct 31 06:03:02 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcd-rev in openshift-etcd... INFO: Fri Oct 31 06:03:02 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcdctl in openshift-etcd... INFO: Fri Oct 31 06:03:03 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container setup in openshift-etcd... INFO: Fri Oct 31 06:03:03 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcd-ensure-env-vars in openshift-etcd... INFO: Fri Oct 31 06:03:03 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcd-resources-copy in openshift-etcd... INFO: Fri Oct 31 06:03:04 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcd in openshift-etcd... INFO: Fri Oct 31 06:03:04 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcd-metrics in openshift-etcd... INFO: Fri Oct 31 06:03:05 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcd-readyz in openshift-etcd... INFO: Fri Oct 31 06:03:05 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcd-rev in openshift-etcd... INFO: Fri Oct 31 06:03:05 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcdctl in openshift-etcd... INFO: Fri Oct 31 06:03:06 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container setup in openshift-etcd... INFO: Fri Oct 31 06:03:06 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcd-ensure-env-vars in openshift-etcd... INFO: Fri Oct 31 06:03:06 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcd-resources-copy in openshift-etcd... INFO: Fri Oct 31 06:03:07 UTC 2025: Dumping log of pods/installer-5-ip-10-0-40-239.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:03:08 UTC 2025: Dumping log of pods/installer-5-ip-10-0-52-51.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:03:08 UTC 2025: Dumping log of pods/installer-7-ip-10-0-119-203.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:03:09 UTC 2025: Dumping log of pods/installer-7-ip-10-0-40-239.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:03:10 UTC 2025: Dumping log of pods/installer-7-ip-10-0-52-51.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:03:11 UTC 2025: Dumping log of pods/installer-8-ip-10-0-119-203.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:03:11 UTC 2025: Dumping log of pods/installer-8-ip-10-0-40-239.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:03:13 UTC 2025: Dumping log of pods/installer-8-ip-10-0-52-51.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:03:13 UTC 2025: Dumping log of pods/revision-pruner-7-ip-10-0-119-203.ec2.internal current container pruner in openshift-etcd... INFO: Fri Oct 31 06:03:14 UTC 2025: Dumping log of pods/revision-pruner-7-ip-10-0-40-239.ec2.internal current container pruner in openshift-etcd... INFO: Fri Oct 31 06:03:15 UTC 2025: Dumping log of pods/revision-pruner-7-ip-10-0-52-51.ec2.internal current container pruner in openshift-etcd... INFO: Fri Oct 31 06:03:16 UTC 2025: Dumping log of pods/revision-pruner-8-ip-10-0-119-203.ec2.internal current container pruner in openshift-etcd... INFO: Fri Oct 31 06:03:16 UTC 2025: Dumping log of pods/revision-pruner-8-ip-10-0-40-239.ec2.internal current container pruner in openshift-etcd... INFO: Fri Oct 31 06:03:17 UTC 2025: Dumping log of pods/revision-pruner-8-ip-10-0-52-51.ec2.internal current container pruner in openshift-etcd... INFO: Fri Oct 31 06:03:17 UTC 2025: >>> Collecting secrets from namespace openshift-etcd <<< NAME TYPE DATA AGE builder-dockercfg-jlctz kubernetes.io/dockercfg 1 127m default-dockercfg-p8x5v kubernetes.io/dockercfg 1 127m deployer-dockercfg-lxvxc kubernetes.io/dockercfg 1 127m etcd-all-certs Opaque 18 147m etcd-all-certs-4 Opaque 18 129m etcd-all-certs-5 Opaque 18 129m etcd-all-certs-6 Opaque 18 125m etcd-all-certs-7 Opaque 18 125m etcd-all-certs-8 Opaque 18 118m etcd-backup-sa-dockercfg-5rhbv kubernetes.io/dockercfg 1 127m etcd-client kubernetes.io/tls 2 147m etcd-metric-client kubernetes.io/tls 2 147m etcd-metric-signer kubernetes.io/tls 2 147m etcd-peer-ip-10-0-119-203.ec2.internal kubernetes.io/tls 2 140m etcd-peer-ip-10-0-145-168 kubernetes.io/tls 2 147m etcd-peer-ip-10-0-40-239.ec2.internal kubernetes.io/tls 2 139m etcd-peer-ip-10-0-52-51.ec2.internal kubernetes.io/tls 2 139m etcd-sa-dockercfg-gfmkj kubernetes.io/dockercfg 1 127m etcd-serving-ip-10-0-119-203.ec2.internal kubernetes.io/tls 2 140m etcd-serving-ip-10-0-145-168 kubernetes.io/tls 2 147m etcd-serving-ip-10-0-40-239.ec2.internal kubernetes.io/tls 2 139m etcd-serving-ip-10-0-52-51.ec2.internal kubernetes.io/tls 2 139m etcd-serving-metrics-ip-10-0-119-203.ec2.internal kubernetes.io/tls 2 139m etcd-serving-metrics-ip-10-0-145-168 kubernetes.io/tls 2 147m etcd-serving-metrics-ip-10-0-40-239.ec2.internal kubernetes.io/tls 2 139m etcd-serving-metrics-ip-10-0-52-51.ec2.internal kubernetes.io/tls 2 139m etcd-signer kubernetes.io/tls 2 147m installer-sa-dockercfg-hrqr5 kubernetes.io/dockercfg 1 127m serving-cert kubernetes.io/tls 2 140m INFO: Fri Oct 31 06:03:33 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-etcd <<< NAME SECRETS AGE builder 1 127m default 1 148m deployer 1 127m etcd-backup-sa 1 140m etcd-sa 1 140m installer-sa 1 140m INFO: Fri Oct 31 06:03:37 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-etcd <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 122m autoscaling.openshift.io 2 139m cluster-baremetal-validating-webhook-configuration 1 139m controlplanemachineset.machine.openshift.io 1 137m machine-api 2 139m monitoringconfigmaps.openshift.io 1 120m multus.openshift.io 1 141m network-node-identity.openshift.io 2 124m performance-addon-operator 1 147m prometheusrules.openshift.io 1 122m stackrox 2 96m INFO: Fri Oct 31 06:03:44 UTC 2025: >>> Collecting catalogsources from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Fri Oct 31 06:03:44 UTC 2025: >>> Collecting subscriptions from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Fri Oct 31 06:03:45 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-etcd <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:03:46 UTC 2025: >>> Collecting central from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Fri Oct 31 06:03:46 UTC 2025: >>> Collecting securedclusters from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Fri Oct 31 06:03:46 UTC 2025: >>> Collecting nodes from namespace openshift-etcd <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 144m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 123m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 144m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 144m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 123m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 123m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:03:52: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-controller-manager', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-controller-manager Active 140m INFO: Fri Oct 31 06:03:52 UTC 2025: >>> Collecting from namespace openshift-controller-manager <<< INFO: Fri Oct 31 06:03:52 UTC 2025: >>> Collecting daemonsets from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Fri Oct 31 06:03:52 UTC 2025: >>> Collecting deployments from namespace openshift-controller-manager <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR controller-manager 3/3 3 3 140m controller-manager quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:326b073a9fbf63167f0760436bd8be4e8496ca5f69b5c11409f5c85fd7a2c734 app=openshift-controller-manager-a,controller-manager=true INFO: Fri Oct 31 06:03:53 UTC 2025: >>> Collecting services from namespace openshift-controller-manager <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR controller-manager ClusterIP 172.30.53.85 443/TCP 140m controller-manager=true INFO: Fri Oct 31 06:03:54 UTC 2025: >>> Collecting pods from namespace openshift-controller-manager <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES controller-manager-5d7d85d87d-7cs4c 1/1 Running 0 125m 10.128.0.50 ip-10-0-119-203.ec2.internal controller-manager-5d7d85d87d-b8b4t 1/1 Running 0 125m 10.130.0.70 ip-10-0-40-239.ec2.internal controller-manager-5d7d85d87d-c44qj 1/1 Running 0 125m 10.129.0.51 ip-10-0-52-51.ec2.internal INFO: Fri Oct 31 06:03:54 UTC 2025: Dumping log of pods/controller-manager-5d7d85d87d-7cs4c current container controller-manager in openshift-controller-manager... INFO: Fri Oct 31 06:03:55 UTC 2025: Dumping log of pods/controller-manager-5d7d85d87d-b8b4t current container controller-manager in openshift-controller-manager... INFO: Fri Oct 31 06:03:56 UTC 2025: Dumping log of pods/controller-manager-5d7d85d87d-c44qj current container controller-manager in openshift-controller-manager... INFO: Fri Oct 31 06:03:57 UTC 2025: >>> Collecting secrets from namespace openshift-controller-manager <<< NAME TYPE DATA AGE builder-dockercfg-ddf6h kubernetes.io/dockercfg 1 127m default-dockercfg-v29nc kubernetes.io/dockercfg 1 127m deployer-dockercfg-sd6hg kubernetes.io/dockercfg 1 127m openshift-controller-manager-sa-dockercfg-s528s kubernetes.io/dockercfg 1 127m serving-cert kubernetes.io/tls 2 140m INFO: Fri Oct 31 06:03:59 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-controller-manager <<< NAME SECRETS AGE builder 1 127m default 1 140m deployer 1 127m openshift-controller-manager-sa 1 140m INFO: Fri Oct 31 06:04:02 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-controller-manager <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 123m autoscaling.openshift.io 2 140m cluster-baremetal-validating-webhook-configuration 1 140m controlplanemachineset.machine.openshift.io 1 137m machine-api 2 140m monitoringconfigmaps.openshift.io 1 121m multus.openshift.io 1 141m network-node-identity.openshift.io 2 125m performance-addon-operator 1 147m prometheusrules.openshift.io 1 123m stackrox 2 96m INFO: Fri Oct 31 06:04:09 UTC 2025: >>> Collecting catalogsources from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Fri Oct 31 06:04:09 UTC 2025: >>> Collecting subscriptions from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Fri Oct 31 06:04:10 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-controller-manager <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:04:11 UTC 2025: >>> Collecting central from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Fri Oct 31 06:04:11 UTC 2025: >>> Collecting securedclusters from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Fri Oct 31 06:04:11 UTC 2025: >>> Collecting nodes from namespace openshift-controller-manager <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 144m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 124m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 144m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 144m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 124m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 124m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:04:17: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-compliance', '/tmp/k8s-service-logs/part-1/k8s-logs'] Error from server (NotFound): namespaces "openshift-compliance" not found INFO: Fri Oct 31 06:04:17 UTC 2025: Skipping missing namespace openshift-compliance 06:04:17: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-ingress', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-ingress Active 140m INFO: Fri Oct 31 06:04:17 UTC 2025: >>> Collecting from namespace openshift-ingress <<< INFO: Fri Oct 31 06:04:17 UTC 2025: >>> Collecting daemonsets from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Fri Oct 31 06:04:17 UTC 2025: >>> Collecting deployments from namespace openshift-ingress <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR router-default 2/2 2 2 140m router quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:086b4263895663cbc94544e41ac197ee96ba661379a498733e1f65f5ce53f1c8 ingresscontroller.operator.openshift.io/deployment-ingresscontroller=default INFO: Fri Oct 31 06:04:18 UTC 2025: >>> Collecting services from namespace openshift-ingress <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR router-default LoadBalancer 172.30.83.245 aa9ecdbe78ba64e70a440bb4f83dace4-1114485601.XXXXXXXXX.elb.amazonaws.com 80:31948/TCP,443:31508/TCP 140m ingresscontroller.operator.openshift.io/deployment-ingresscontroller=default router-internal-default ClusterIP 172.30.34.155 80/TCP,443/TCP,1936/TCP 140m ingresscontroller.operator.openshift.io/deployment-ingresscontroller=default INFO: Fri Oct 31 06:04:19 UTC 2025: >>> Collecting pods from namespace openshift-ingress <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES router-default-5c65bb8759-k9k7w 1/1 Running 0 140m 10.129.2.10 ip-10-0-28-116.ec2.internal router-default-5c65bb8759-z9czs 1/1 Running 0 140m 10.131.0.6 ip-10-0-72-187.ec2.internal INFO: Fri Oct 31 06:04:20 UTC 2025: Dumping log of pods/router-default-5c65bb8759-k9k7w current container router in openshift-ingress... INFO: Fri Oct 31 06:04:21 UTC 2025: Dumping log of pods/router-default-5c65bb8759-z9czs current container router in openshift-ingress... INFO: Fri Oct 31 06:04:21 UTC 2025: >>> Collecting secrets from namespace openshift-ingress <<< NAME TYPE DATA AGE builder-dockercfg-6kd7x kubernetes.io/dockercfg 1 128m default-dockercfg-nqzj6 kubernetes.io/dockercfg 1 128m deployer-dockercfg-fwwnj kubernetes.io/dockercfg 1 128m router-certs-default kubernetes.io/tls 2 140m router-dockercfg-znssc kubernetes.io/dockercfg 1 128m router-metrics-certs-default kubernetes.io/tls 2 140m router-stats-default Opaque 2 140m INFO: Fri Oct 31 06:04:25 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-ingress <<< NAME SECRETS AGE builder 1 128m default 1 140m deployer 1 128m router 1 140m INFO: Fri Oct 31 06:04:28 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-ingress <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 123m autoscaling.openshift.io 2 140m cluster-baremetal-validating-webhook-configuration 1 140m controlplanemachineset.machine.openshift.io 1 137m machine-api 2 140m monitoringconfigmaps.openshift.io 1 121m multus.openshift.io 1 142m network-node-identity.openshift.io 2 125m performance-addon-operator 1 147m prometheusrules.openshift.io 1 123m stackrox 2 96m INFO: Fri Oct 31 06:04:35 UTC 2025: >>> Collecting catalogsources from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Fri Oct 31 06:04:35 UTC 2025: >>> Collecting subscriptions from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Fri Oct 31 06:04:35 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-ingress <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:04:36 UTC 2025: >>> Collecting central from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Fri Oct 31 06:04:36 UTC 2025: >>> Collecting securedclusters from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Fri Oct 31 06:04:37 UTC 2025: >>> Collecting nodes from namespace openshift-ingress <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 145m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 124m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 145m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 145m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 124m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 124m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:04:42: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-marketplace', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-marketplace Active 148m INFO: Fri Oct 31 06:04:42 UTC 2025: >>> Collecting from namespace openshift-marketplace <<< INFO: Fri Oct 31 06:04:42 UTC 2025: >>> Collecting daemonsets from namespace openshift-marketplace <<< No resources found in openshift-marketplace namespace. INFO: Fri Oct 31 06:04:43 UTC 2025: >>> Collecting deployments from namespace openshift-marketplace <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR marketplace-operator 1/1 1 1 148m marketplace-operator quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:99ebaeb9609d1e163c4d312d51f7bad7d38acff5f38c508a0d8c5d21317d5ed2 name=marketplace-operator INFO: Fri Oct 31 06:04:43 UTC 2025: >>> Collecting services from namespace openshift-marketplace <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR certified-operators ClusterIP 172.30.141.22 50051/TCP 140m olm.catalogSource=certified-operators,olm.managed=true community-operators ClusterIP 172.30.236.232 50051/TCP 140m olm.catalogSource=community-operators,olm.managed=true marketplace-operator-metrics ClusterIP 172.30.25.165 8383/TCP,8081/TCP 148m name=marketplace-operator redhat-marketplace ClusterIP 172.30.171.202 50051/TCP 140m olm.catalogSource=redhat-marketplace,olm.managed=true redhat-operators ClusterIP 172.30.101.216 50051/TCP 140m olm.catalogSource=redhat-operators,olm.managed=true INFO: Fri Oct 31 06:04:46 UTC 2025: >>> Collecting pods from namespace openshift-marketplace <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES certified-operators-p4cqh 1/1 Running 0 128m 10.129.0.36 ip-10-0-52-51.ec2.internal community-operators-bfkhb 1/1 Running 0 5m52s 10.129.0.118 ip-10-0-52-51.ec2.internal marketplace-operator-59f9fd9b7-hhzg9 1/1 Running 1 (135m ago) 142m 10.130.0.27 ip-10-0-40-239.ec2.internal redhat-marketplace-b9zcc 1/1 Running 0 128m 10.129.0.38 ip-10-0-52-51.ec2.internal redhat-operators-j85mj 1/1 Running 0 128m 10.129.0.39 ip-10-0-52-51.ec2.internal INFO: Fri Oct 31 06:04:47 UTC 2025: Dumping log of pods/certified-operators-p4cqh current container registry-server in openshift-marketplace... INFO: Fri Oct 31 06:04:48 UTC 2025: Dumping log of pods/certified-operators-p4cqh current container extract-utilities in openshift-marketplace... INFO: Fri Oct 31 06:04:48 UTC 2025: Dumping log of pods/certified-operators-p4cqh current container extract-content in openshift-marketplace... INFO: Fri Oct 31 06:04:49 UTC 2025: Dumping log of pods/community-operators-bfkhb current container registry-server in openshift-marketplace... INFO: Fri Oct 31 06:04:50 UTC 2025: Dumping log of pods/community-operators-bfkhb current container extract-utilities in openshift-marketplace... INFO: Fri Oct 31 06:04:50 UTC 2025: Dumping log of pods/community-operators-bfkhb current container extract-content in openshift-marketplace... INFO: Fri Oct 31 06:04:51 UTC 2025: Dumping log of pods/marketplace-operator-59f9fd9b7-hhzg9 current container marketplace-operator in openshift-marketplace... INFO: Fri Oct 31 06:04:51 UTC 2025: Dumping log of pods/marketplace-operator-59f9fd9b7-hhzg9 previous container marketplace-operator in openshift-marketplace... INFO: Fri Oct 31 06:04:52 UTC 2025: Dumping log of pods/redhat-marketplace-b9zcc current container registry-server in openshift-marketplace... INFO: Fri Oct 31 06:04:52 UTC 2025: Dumping log of pods/redhat-marketplace-b9zcc current container extract-utilities in openshift-marketplace... INFO: Fri Oct 31 06:04:53 UTC 2025: Dumping log of pods/redhat-marketplace-b9zcc current container extract-content in openshift-marketplace... INFO: Fri Oct 31 06:04:53 UTC 2025: Dumping log of pods/redhat-operators-j85mj current container registry-server in openshift-marketplace... INFO: Fri Oct 31 06:04:54 UTC 2025: Dumping log of pods/redhat-operators-j85mj current container extract-utilities in openshift-marketplace... INFO: Fri Oct 31 06:04:55 UTC 2025: Dumping log of pods/redhat-operators-j85mj current container extract-content in openshift-marketplace... INFO: Fri Oct 31 06:04:55 UTC 2025: >>> Collecting secrets from namespace openshift-marketplace <<< NAME TYPE DATA AGE builder-dockercfg-clrc9 kubernetes.io/dockercfg 1 128m certified-operators-dockercfg-8dqpl kubernetes.io/dockercfg 1 128m community-operators-dockercfg-wgjfb kubernetes.io/dockercfg 1 128m default-dockercfg-9hdtx kubernetes.io/dockercfg 1 128m deployer-dockercfg-gxd6l kubernetes.io/dockercfg 1 128m marketplace-operator-dockercfg-gjpf6 kubernetes.io/dockercfg 1 128m marketplace-operator-metrics kubernetes.io/tls 2 141m redhat-marketplace-dockercfg-jg892 kubernetes.io/dockercfg 1 128m redhat-operators-dockercfg-fjnhf kubernetes.io/dockercfg 1 128m INFO: Fri Oct 31 06:05:00 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-marketplace <<< NAME SECRETS AGE builder 1 128m certified-operators 1 140m community-operators 1 140m default 1 148m deployer 1 128m marketplace-operator 1 148m redhat-marketplace 1 140m redhat-operators 1 140m INFO: Fri Oct 31 06:05:05 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-marketplace <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 124m autoscaling.openshift.io 2 141m cluster-baremetal-validating-webhook-configuration 1 141m controlplanemachineset.machine.openshift.io 1 138m machine-api 2 141m monitoringconfigmaps.openshift.io 1 122m multus.openshift.io 1 142m network-node-identity.openshift.io 2 126m performance-addon-operator 1 148m prometheusrules.openshift.io 1 124m stackrox 2 97m INFO: Fri Oct 31 06:05:12 UTC 2025: >>> Collecting catalogsources from namespace openshift-marketplace <<< NAME DISPLAY TYPE PUBLISHER AGE certified-operators Certified Operators grpc Red Hat 141m community-operators Community Operators grpc Red Hat 141m redhat-marketplace Red Hat Marketplace grpc Red Hat 141m redhat-operators Red Hat Operators grpc Red Hat 141m INFO: Fri Oct 31 06:05:14 UTC 2025: >>> Collecting subscriptions from namespace openshift-marketplace <<< No resources found in openshift-marketplace namespace. INFO: Fri Oct 31 06:05:14 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-marketplace <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:05:15 UTC 2025: >>> Collecting central from namespace openshift-marketplace <<< No resources found in openshift-marketplace namespace. INFO: Fri Oct 31 06:05:16 UTC 2025: >>> Collecting securedclusters from namespace openshift-marketplace <<< No resources found in openshift-marketplace namespace. INFO: Fri Oct 31 06:05:16 UTC 2025: >>> Collecting nodes from namespace openshift-marketplace <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 145m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 125m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 145m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 145m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 125m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 125m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:05:22: Running post command: ['scripts/ci/collect-infrastructure-logs.sh', '/tmp/k8s-service-logs/part-1/k8s-logs'] Fri Oct 31 06:05:22 UTC 2025 Attempting to collect kube API server audit logs Client Version: 4.11.0-0.okd-2022-12-02-145640 Kustomize Version: v4.5.4 Server Version: 4.21.0-0.nightly-2025-10-30-125804 Kubernetes Version: v1.34.1 [must-gather ] OUT Using must-gather plug-in image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db9c9606365c344966d73b2bf801fc7b47819160e8ec76d8d25ce5cd113f90dc When opening a support case, bugzilla, or issue please include the following summary data along with any other requested information: ClusterID: 32d6e132-796d-480d-8c64-00017697401b ClusterVersion: Stable at "4.21.0-0.nightly-2025-10-30-125804" ClusterOperators: All healthy and stable [must-gather ] OUT namespace/openshift-must-gather-9p6nd created [must-gather ] OUT clusterrolebinding.rbac.authorization.k8s.io/must-gather-khwgg created Warning: spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead [must-gather ] OUT pod for plug-in image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db9c9606365c344966d73b2bf801fc7b47819160e8ec76d8d25ce5cd113f90dc created [must-gather-8r2g7] POD 2025-10-31T06:05:24.897772810Z WARNING: Collecting one or more audit logs on ALL masters in your cluster. This could take a large amount of time. [must-gather-8r2g7] POD 2025-10-31T06:05:25.012450373Z INFO: Started downloading openshift-apiserver/audit.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.012807680Z INFO: Started downloading openshift-apiserver/audit.log from ip-10-0-40-239.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.013577146Z INFO: Started downloading openshift-apiserver/audit.log from ip-10-0-52-51.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.174345762Z INFO: Started downloading kube-apiserver/audit-2025-10-31T04-43-08.865.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.175671290Z INFO: Started downloading kube-apiserver/audit-2025-10-31T05-59-26.946.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.176674791Z INFO: Started downloading kube-apiserver/audit.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.182389789Z INFO: Started downloading kube-apiserver/termination.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.184632945Z INFO: Started downloading kube-apiserver/audit-2025-10-31T05-14-54.994.log from ip-10-0-40-239.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.189581838Z INFO: Started downloading kube-apiserver/audit.log from ip-10-0-40-239.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.203701280Z INFO: Started downloading kube-apiserver/termination.log from ip-10-0-40-239.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.207808475Z INFO: Started downloading kube-apiserver/audit-2025-10-31T06-04-20.157.log from ip-10-0-52-51.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.239852588Z INFO: Finished downloading openshift-apiserver/audit.log from ip-10-0-52-51.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.245323801Z INFO: Started downloading kube-apiserver/audit.log from ip-10-0-52-51.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.253204824Z INFO: Finished downloading openshift-apiserver/audit.log from ip-10-0-40-239.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.254957500Z INFO: Started downloading kube-apiserver/termination.log from ip-10-0-52-51.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.325167003Z INFO: Finished downloading openshift-apiserver/audit.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.455355246Z INFO: Finished downloading kube-apiserver/termination.log from ip-10-0-40-239.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.504914611Z INFO: Started downloading oauth-apiserver/audit.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.544445920Z INFO: Started downloading oauth-apiserver/audit.log from ip-10-0-40-239.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.555184562Z INFO: Finished downloading kube-apiserver/audit.log from ip-10-0-52-51.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.559471710Z INFO: Started downloading oauth-apiserver/audit.log from ip-10-0-52-51.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.609578847Z INFO: Finished downloading kube-apiserver/termination.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.672952408Z INFO: Finished downloading kube-apiserver/termination.log from ip-10-0-52-51.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:25.902054518Z INFO: Finished downloading oauth-apiserver/audit.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:26.039848999Z INFO: Finished downloading kube-apiserver/audit.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:26.053293317Z INFO: Finished downloading oauth-apiserver/audit.log from ip-10-0-52-51.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:26.062511868Z INFO: Finished downloading oauth-apiserver/audit.log from ip-10-0-40-239.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:26.280605880Z INFO: Started downloading oauth-server/audit.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:26.287977222Z INFO: Started downloading oauth-server/audit.log from ip-10-0-40-239.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:26.291179758Z INFO: Started downloading oauth-server/audit.log from ip-10-0-52-51.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:26.555772693Z INFO: Finished downloading oauth-server/audit.log from ip-10-0-40-239.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:26.558248674Z INFO: Finished downloading oauth-server/audit.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:26.565215178Z INFO: Finished downloading oauth-server/audit.log from ip-10-0-52-51.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:28.163150227Z INFO: Finished downloading kube-apiserver/audit.log from ip-10-0-40-239.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:29.649118450Z INFO: Finished downloading kube-apiserver/audit-2025-10-31T06-04-20.157.log from ip-10-0-52-51.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:29.672231348Z INFO: Finished downloading kube-apiserver/audit-2025-10-31T05-14-54.994.log from ip-10-0-40-239.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:29.904228188Z INFO: Finished downloading kube-apiserver/audit-2025-10-31T04-43-08.865.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:29.941870767Z INFO: Finished downloading kube-apiserver/audit-2025-10-31T05-59-26.946.log from ip-10-0-119-203.ec2.internal [must-gather-8r2g7] POD 2025-10-31T06:05:30.125115878Z Collecting logs from metrics server pod: metrics-server-5db665f975-57n6s [must-gather-8r2g7] POD 2025-10-31T06:05:30.283711669Z Collecting logs from metrics server pod: metrics-server-5db665f975-g9kcp [must-gather-8r2g7] POD 2025-10-31T06:05:30.439051553Z INFO: Audit logs collected. [must-gather-8r2g7] OUT waiting for gather to complete [must-gather-8r2g7] OUT downloading gather output WARNING: rsync command not found in path. Please use your package manager to install it. [must-gather-8r2g7] OUT ./audit_logs/openshift-apiserver/ip-10-0-119-203.ec2.internal-audit.log.gz [must-gather-8r2g7] OUT ./audit_logs/openshift-apiserver/ip-10-0-40-239.ec2.internal-audit.log.gz [must-gather-8r2g7] OUT ./audit_logs/openshift-apiserver/ip-10-0-52-51.ec2.internal-audit.log.gz [must-gather-8r2g7] OUT ./audit_logs/openshift-apiserver.audit_logs_listing [must-gather-8r2g7] OUT ./audit_logs/kube-apiserver/ip-10-0-119-203.ec2.internal-audit-2025-10-31T04-43-08.865.log.gz [must-gather-8r2g7] OUT ./audit_logs/kube-apiserver/ip-10-0-119-203.ec2.internal-termination.log.gz [must-gather-8r2g7] OUT ./audit_logs/kube-apiserver/ip-10-0-119-203.ec2.internal-audit.log.gz [must-gather-8r2g7] OUT ./audit_logs/kube-apiserver/ip-10-0-40-239.ec2.internal-audit-2025-10-31T05-14-54.994.log.gz [must-gather-8r2g7] OUT ./audit_logs/kube-apiserver/ip-10-0-119-203.ec2.internal-audit-2025-10-31T05-59-26.946.log.gz [must-gather-8r2g7] OUT ./audit_logs/kube-apiserver/ip-10-0-52-51.ec2.internal-audit-2025-10-31T06-04-20.157.log.gz [must-gather-8r2g7] OUT ./audit_logs/kube-apiserver/ip-10-0-40-239.ec2.internal-termination.log.gz [must-gather-8r2g7] OUT ./audit_logs/kube-apiserver/ip-10-0-40-239.ec2.internal-audit.log.gz [must-gather-8r2g7] OUT ./audit_logs/kube-apiserver/ip-10-0-52-51.ec2.internal-audit.log.gz [must-gather-8r2g7] OUT ./audit_logs/kube-apiserver/ip-10-0-52-51.ec2.internal-termination.log.gz [must-gather-8r2g7] OUT ./audit_logs/kube-apiserver.audit_logs_listing [must-gather-8r2g7] OUT ./audit_logs/oauth-apiserver/ip-10-0-119-203.ec2.internal-audit.log.gz [must-gather-8r2g7] OUT ./audit_logs/oauth-apiserver/ip-10-0-40-239.ec2.internal-audit.log.gz [must-gather-8r2g7] OUT ./audit_logs/oauth-apiserver/ip-10-0-52-51.ec2.internal-audit.log.gz [must-gather-8r2g7] OUT ./audit_logs/oauth-apiserver.audit_logs_listing [must-gather-8r2g7] OUT ./audit_logs/etcd.audit_logs_listing [must-gather-8r2g7] OUT ./audit_logs/oauth-server/ip-10-0-119-203.ec2.internal-audit.log.gz [must-gather-8r2g7] OUT ./audit_logs/oauth-server/ip-10-0-40-239.ec2.internal-audit.log.gz [must-gather-8r2g7] OUT ./audit_logs/oauth-server/ip-10-0-52-51.ec2.internal-audit.log.gz [must-gather-8r2g7] OUT ./audit_logs/oauth-server.audit_logs_listing [must-gather-8r2g7] OUT ./audit_logs/monitoring/metrics-server-5db665f975-57n6s/audit.log [must-gather-8r2g7] OUT ./audit_logs/monitoring/metrics-server-5db665f975-g9kcp/audit.log Ignoring the following flags because they only apply to rsync: -z [must-gather ] OUT namespace/openshift-must-gather-9p6nd deleted [must-gather ] OUT clusterrolebinding.rbac.authorization.k8s.io/must-gather-khwgg deleted Reprinting Cluster State: When opening a support case, bugzilla, or issue please include the following summary data along with any other requested information: ClusterID: 32d6e132-796d-480d-8c64-00017697401b ClusterVersion: Stable at "4.21.0-0.nightly-2025-10-30-125804" ClusterOperators: All healthy and stable 69M must-gather.local.8587312116960573582 Fri Oct 31 06:05:33 UTC 2025 Attempting to collect kube API server log Starting to serve on 127.0.0.1:8001 * Trying ::1:8001... * connect to ::1 port 8001 failed: Connection refused * Trying 127.0.0.1:8001... * Connected to localhost (127.0.0.1) port 8001 (#0) > GET /logs/kube-apiserver.log HTTP/1.1 > Host: localhost:8001 > User-Agent: curl/7.76.1 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 404 Not Found < Audit-Id: aa8ab7fc-e879-415d-80d8-a5581f643c15 < Cache-Control: no-cache, private < Content-Length: 19 < Content-Type: text/plain; charset=utf-8 < Date: Fri, 31 Oct 2025 06:05:38 GMT < Strict-Transport-Security: max-age=31536000; includeSubDomains; preload < X-Content-Type-Options: nosniff < X-Kubernetes-Pf-Flowschema-Uid: f7e95912-a15f-4ee0-8cd5-30bdbcfb8bad < X-Kubernetes-Pf-Prioritylevel-Uid: 1dedc23d-c830-49b5-966a-26f2deffde8c < { [19 bytes data] * Connection #0 to host localhost left intact Fri Oct 31 06:05:38 UTC 2025 Attempting to collect kube API server metrics 06:05:38: Running post command: ['tests/e2e/lib.sh', 'check_stackrox_logs', '/tmp/k8s-service-logs/part-1/k8s-logs'] INFO: Fri Oct 31 06:05:38 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-ljwt9_object.json for OOMKilled INFO: Fri Oct 31 06:05:38 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-qhbkl_object.json for OOMKilled INFO: Fri Oct 31 06:05:38 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-tzjw7_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/central-795644c465-msqhx_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/central-db-84b98c8889-fzcq2_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-cmgmb_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-dnv9p_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-nhmnm_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-pj5kz_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-s9bvx_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-v2g62_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/config-controller-5f68659754-56qpc_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/scanner-7487f9cbb8-mchmc_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/sensor-7b4784c4d5-r7xsl_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/webhookserver-84f798856c-55slf_object.json for OOMKilled INFO: Fri Oct 31 06:05:39 UTC 2025: Checking for unexplained restarts by stackrox pods ls: cannot access '/tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/*-previous.log': No such file or directory INFO: Fri Oct 31 06:05:39 UTC 2025: No pod restarts were found INFO: Fri Oct 31 06:05:39 UTC 2025: Checking stackrox pod logs for errors INFO: Fri Oct 31 06:05:40 UTC 2025: Checking app: scanner-db, logs: /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42-db.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42-init-db.log grep: missing ) INFO: Fri Oct 31 06:05:40 UTC 2025: Checking app: config-controller, logs: /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/config-controller-5f68659754-56qpc-manager.log grep: missing ) INFO: Fri Oct 31 06:05:40 UTC 2025: Checking app: central-db, logs: /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/central-db-84b98c8889-fzcq2-central-db.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/central-db-84b98c8889-fzcq2-init-db.log grep: missing ) INFO: Fri Oct 31 06:05:40 UTC 2025: Checking app: scanner, logs: /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/scanner-7487f9cbb8-mchmc-scanner.log grep: missing ) INFO: Fri Oct 31 06:05:40 UTC 2025: Checking app: webhookserver, logs: /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/webhookserver-84f798856c-55slf-webhookserver.log grep: missing ) INFO: Fri Oct 31 06:05:40 UTC 2025: Checking app: collector, logs: /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-cmgmb-collector.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-cmgmb-compliance.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-cmgmb-init-tls-certs.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-cmgmb-node-inventory.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-dnv9p-collector.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-dnv9p-compliance.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-dnv9p-init-tls-certs.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-dnv9p-node-inventory.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-nhmnm-collector.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-nhmnm-compliance.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-nhmnm-init-tls-certs.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-nhmnm-node-inventory.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-pj5kz-collector.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-pj5kz-compliance.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-pj5kz-init-tls-certs.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-pj5kz-node-inventory.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-s9bvx-collector.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-s9bvx-compliance.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-s9bvx-init-tls-certs.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-s9bvx-node-inventory.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-v2g62-collector.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-v2g62-compliance.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-v2g62-init-tls-certs.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-v2g62-node-inventory.log grep: missing ) INFO: Fri Oct 31 06:05:40 UTC 2025: Checking app: admission-control, logs: /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-ljwt9-admission-control.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-ljwt9-init-tls-certs.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-qhbkl-admission-control.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-qhbkl-init-tls-certs.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-tzjw7-admission-control.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-tzjw7-init-tls-certs.log grep: missing ) INFO: Fri Oct 31 06:05:40 UTC 2025: Checking app: sensor, logs: /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/sensor-7b4784c4d5-r7xsl-crs.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/sensor-7b4784c4d5-r7xsl-init-tls-certs.log /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/sensor-7b4784c4d5-r7xsl-sensor.log grep: missing ) INFO: Fri Oct 31 06:05:40 UTC 2025: Checking app: central, logs: /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/central-795644c465-msqhx-central.log grep: missing ) 06:05:40: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', '/tmp/qa-part1-misc-logs', 'part-1/qa-part1-misc-logs'] INFO: Fri Oct 31 06:05:40 UTC 2025: Storing artifacts INFO: /tmp/qa-part1-misc-logs is missing, nothing to upload 06:05:40: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', '/tmp/collector-metrics', 'part-1/collector-metrics'] INFO: Fri Oct 31 06:05:40 UTC 2025: Storing artifacts INFO: Fri Oct 31 06:05:40 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:05:44 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/collector-metrics... 06:05:46: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', 'debug-dump', 'part-1/debug-dump'] INFO: Fri Oct 31 06:05:46 UTC 2025: Storing artifacts INFO: Fri Oct 31 06:05:46 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:05:49 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/debug-dump... 06:05:51: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', 'diagnostic-bundle', 'part-1/diagnostic-bundle'] INFO: Fri Oct 31 06:05:51 UTC 2025: Storing artifacts INFO: Fri Oct 31 06:05:51 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:05:54 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/diagnostic-bundle... 06:05:56: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', 'central-data', 'part-1/central-data'] INFO: Fri Oct 31 06:05:56 UTC 2025: Storing artifacts INFO: Fri Oct 31 06:05:56 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:05:59 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/central-data... 06:06:02: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', '/tmp/k8s-service-logs/part-1/k8s-logs', 'part-1/k8s-logs'] INFO: Fri Oct 31 06:06:02 UTC 2025: Storing artifacts INFO: Fri Oct 31 06:06:02 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:06:05 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs... **** **** 06:06:13: post test completed [QA tests part I] **** **** **** 06:06:13: run completed [QA tests part I] **** **** **** 06:06:13: About to run [QA tests part II] **** **** **** 06:06:13: About to run pre test [QA tests part II] **** **** **** 06:06:13: pre test completed [QA tests part II] **** **** **** 06:06:13: About to run test [QA tests part II] **** Executing qa-tests-backend tests (part II) INFO: Fri Oct 31 06:06:13 UTC 2025: QA Automation Platform Part 2 make: Entering directory '/go/src/github.com/stackrox/stackrox/qa-tests-backend' + compile Type-safe project accessors is an incubating feature. > Task :annotations:compileJava NO-SOURCE > Task :annotations:compileGroovy UP-TO-DATE > Task :annotations:processResources NO-SOURCE > Task :annotations:classes UP-TO-DATE > Task :annotations:jar UP-TO-DATE > Task :extractIncludeProto UP-TO-DATE > Task :extractProto UP-TO-DATE > Task :generateProto UP-TO-DATE > Task :compileJava UP-TO-DATE > Task :compileGroovy UP-TO-DATE > Task :processResources UP-TO-DATE > Task :classes UP-TO-DATE > Task :jar UP-TO-DATE > Task :assemble UP-TO-DATE > Task :annotations:assemble UP-TO-DATE > Task :extractIncludeTestProto UP-TO-DATE > Task :extractTestProto UP-TO-DATE > Task :generateTestProto NO-SOURCE > Task :compileTestJava NO-SOURCE > Task :compileTestGroovy UP-TO-DATE > Task :processTestResources UP-TO-DATE > Task :testClasses UP-TO-DATE > Task :annotations:compileTestJava NO-SOURCE > Task :annotations:compileTestGroovy NO-SOURCE > Task :annotations:processTestResources NO-SOURCE > Task :annotations:testClasses UP-TO-DATE [Incubating] Problems report is available at: file:///go/src/github.com/stackrox/stackrox/qa-tests-backend/build/reports/problems/problems-report.html Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0. You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins. For more on this, please refer to https://docs.gradle.org/8.13/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation. BUILD SUCCESSFUL in 1s 13 actionable tasks: 13 up-to-date + sensor-bounce-test TEST_TARGET="sensor-bounce-test" ./gradlew testSensorBounce testSensorBounceNext Type-safe project accessors is an incubating feature. > Task :annotations:compileJava NO-SOURCE > Task :annotations:compileGroovy UP-TO-DATE > Task :annotations:processResources NO-SOURCE > Task :annotations:classes UP-TO-DATE > Task :annotations:jar UP-TO-DATE > Task :extractIncludeProto UP-TO-DATE > Task :extractProto UP-TO-DATE > Task :generateProto UP-TO-DATE > Task :compileJava UP-TO-DATE > Task :compileGroovy UP-TO-DATE > Task :processResources UP-TO-DATE > Task :classes UP-TO-DATE > Task :extractIncludeTestProto UP-TO-DATE > Task :extractTestProto UP-TO-DATE > Task :generateTestProto NO-SOURCE > Task :compileTestJava NO-SOURCE > Task :compileTestGroovy UP-TO-DATE > Task :processTestResources UP-TO-DATE > Task :testClasses UP-TO-DATE > Task :testSensorBounce ReconciliationTest STANDARD_OUT 06:06:18 | INFO | ReconciliationTest | ReconciliationTest | Starting testsuite 06:06:18 | INFO | ReconciliationTest | BaseSpecification | Performing global setup 06:06:19 | DEBUG | ReconciliationTest | Kubernetes | quay: secret created. 06:06:19 | DEBUG | ReconciliationTest | Kubernetes | public-dockerhub: secret created. 06:06:19 | DEBUG | ReconciliationTest | Kubernetes | gcr-image-pull-secret: secret created. 06:06:19 | DEBUG | ReconciliationTest | Kubernetes | redhat-image-pull-secret: secret created. 06:06:19 | DEBUG | ReconciliationTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 06:06:20 | INFO | ReconciliationTest | BaseSpecification | Testing against: 06:06:20 | INFO | ReconciliationTest | BaseSpecification | version: "4.10.x-207-g071f40eed6" build_flavor: "development" license_status: VALID 06:06:20 | INFO | ReconciliationTest | BaseSpecification | isGKE: false 06:06:20 | INFO | ReconciliationTest | BaseSpecification | isEKS: false 06:06:20 | INFO | ReconciliationTest | BaseSpecification | isOpenShift4: true 06:06:20 | INFO | ReconciliationTest | BaseSpecification | testTarget: sensor-bounce-test 06:06:20 | INFO | ReconciliationTest | BaseSpecification | Adding core image registry integration 06:06:20 | DEBUG | ReconciliationTest | ImageIntegrationService | Integration tested: core quay 06:06:20 | DEBUG | ReconciliationTest | ImageIntegrationService | Integration created: core quay: 7240d89c-b668-4f5f-8b3c-c83eaf94f155 06:06:20 | DEBUG | ReconciliationTest | ImageIntegrationService | Integration found after creation: core quay: 7240d89c-b668-4f5f-8b3c-c83eaf94f155 06:06:20 | DEBUG | ReconciliationTest | OpenShift | Namespace qa already exists ReconciliationTest > Verify the Sensor reconciles after being restarted SKIPPED ReconciliationTest STANDARD_OUT 06:06:21 | INFO | ReconciliationTest | ReconciliationTest | Ending testsuite 06:06:21 | INFO | ReconciliationTest | ReconciliationTest | Checking if cluster is healthy after test 06:06:21 | DEBUG | ReconciliationTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries 06:06:21 | INFO | | BaseSpecification | Performing global shutdown 06:06:21 | INFO | | RoleService | Deleted role: Test Automation Role - 97756 and permission set 06:06:21 | INFO | | BaseSpecification | Removing core image registry integration 06:06:21 | DEBUG | | ImageIntegrationService | Image integration deleted: 7240d89c-b668-4f5f-8b3c-c83eaf94f155 > Task :testSensorBounceNext AdmissionControllerTest STANDARD_OUT 06:06:24 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testsuite 06:06:24 | INFO | AdmissionControllerTest | BaseSpecification | Performing global setup 06:06:24 | DEBUG | AdmissionControllerTest | Kubernetes | quay: secret created. 06:06:24 | DEBUG | AdmissionControllerTest | Kubernetes | public-dockerhub: secret created. 06:06:25 | DEBUG | AdmissionControllerTest | Kubernetes | gcr-image-pull-secret: secret created. 06:06:25 | DEBUG | AdmissionControllerTest | Kubernetes | redhat-image-pull-secret: secret created. 06:06:25 | DEBUG | AdmissionControllerTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 06:06:25 | INFO | AdmissionControllerTest | BaseSpecification | Testing against: 06:06:25 | INFO | AdmissionControllerTest | BaseSpecification | version: "4.10.x-207-g071f40eed6" build_flavor: "development" license_status: VALID 06:06:25 | INFO | AdmissionControllerTest | BaseSpecification | isGKE: false 06:06:25 | INFO | AdmissionControllerTest | BaseSpecification | isEKS: false 06:06:25 | INFO | AdmissionControllerTest | BaseSpecification | isOpenShift4: true 06:06:25 | INFO | AdmissionControllerTest | BaseSpecification | testTarget: sensor-bounce-test 06:06:26 | INFO | AdmissionControllerTest | BaseSpecification | Adding core image registry integration 06:06:26 | DEBUG | AdmissionControllerTest | ImageIntegrationService | Integration tested: core quay 06:06:26 | DEBUG | AdmissionControllerTest | ImageIntegrationService | Integration created: core quay: 2de9068f-ab5f-4e25-a457-28d098dab5e5 06:06:26 | DEBUG | AdmissionControllerTest | ImageIntegrationService | Integration found after creation: core quay: 2de9068f-ab5f-4e25-a457-28d098dab5e5 06:06:26 | DEBUG | AdmissionControllerTest | OpenShift | Namespace qa already exists 06:07:07 | INFO | AdmissionControllerTest | OpenShift | Created namespace qa-admission-controller-test 06:07:07 | INFO | AdmissionControllerTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-admission-controller-test namespace. 06:07:07 | DEBUG | AdmissionControllerTest | Kubernetes | quay: secret created. 06:07:07 | DEBUG | AdmissionControllerTest | Kubernetes | default-dockercfg-9g79g: secret created. 06:07:07 | DEBUG | AdmissionControllerTest | Kubernetes | redhat-image-pull-secret: secret created. 06:07:07 | DEBUG | AdmissionControllerTest | Kubernetes | public-dockerhub: secret created. 06:07:07 | DEBUG | AdmissionControllerTest | Kubernetes | gcr-image-pull-secret: secret created. AdmissionControllerTest > Verify admission controller performs image scans if Sensor is Unavailable STANDARD_OUT 06:07:07 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify admission controller performs image scans if Sensor is Unavailable 06:07:14 | INFO | AdmissionControllerTest | Kubernetes | Scaled the deployment sensor to 0 06:07:14 | DEBUG | AdmissionControllerTest | Helpers | Calling AdmissionControllerTest.waitForSensorNotHealthy with 60 retries 06:07:14 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 0 of 60): Condition not satisfied: status.sensorHealthStatus != ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | HEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: HEALTHY last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true admission_control_health_status: HEALTHY admission_control_health_info { total_desired_pods: 3 total_ready_pods: 3 } id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" scanner_health_info { total_desired_analyzer_pods: 1 total_ready_analyzer_pods: 1 total_desired_db_pods: 1 total_ready_db_pods: 1 } scanner_health_status: HEALTHY 06:07:17 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 1 of 60): Condition not satisfied: status.sensorHealthStatus != ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | HEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: HEALTHY last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true admission_control_health_status: HEALTHY admission_control_health_info { total_desired_pods: 3 total_ready_pods: 3 } id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" scanner_health_info { total_desired_analyzer_pods: 1 total_ready_analyzer_pods: 1 total_desired_db_pods: 1 total_ready_db_pods: 1 } scanner_health_status: HEALTHY 06:07:20 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 2 of 60): Condition not satisfied: status.sensorHealthStatus != ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | HEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: HEALTHY last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:07:23 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 3 of 60): Condition not satisfied: status.sensorHealthStatus != ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | HEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: HEALTHY last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:07:26 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 4 of 60): Condition not satisfied: status.sensorHealthStatus != ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | HEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: HEALTHY last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:07:29 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 5 of 60): Condition not satisfied: status.sensorHealthStatus != ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | HEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: HEALTHY last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:07:32 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 6 of 60): Condition not satisfied: status.sensorHealthStatus != ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | HEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: HEALTHY last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:07:35 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 7 of 60): Condition not satisfied: status.sensorHealthStatus != ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | HEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: HEALTHY last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:07:38 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 8 of 60): Condition not satisfied: status.sensorHealthStatus != ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | HEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: HEALTHY last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:07:41 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 9 of 60): Condition not satisfied: status.sensorHealthStatus != ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | HEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: HEALTHY last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:07:44 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 10 of 60): Condition not satisfied: status.sensorHealthStatus != ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | HEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: HEALTHY last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:07:48 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 11 of 60): Condition not satisfied: status.sensorHealthStatus != ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | HEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: HEALTHY last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:07:51 | INFO | AdmissionControllerTest | AdmissionControllerTest | Sensor is now scaled to 0 06:07:52 | INFO | AdmissionControllerTest | Kubernetes | Scaled the deployment admission-control to 0 06:08:07 | INFO | AdmissionControllerTest | AdmissionControllerTest | Admission controller scaled to 0, was 3 06:08:09 | INFO | AdmissionControllerTest | Kubernetes | Scaled the deployment admission-control to 3 06:08:17 | DEBUG | AdmissionControllerTest | Kubernetes | Encountered 3 ready pods matching [app:admission-control]: [admission-control-7c9bf84889-fsbsk, admission-control-7c9bf84889-k75ft, admission-control-7c9bf84889-wp94p] 06:08:17 | INFO | AdmissionControllerTest | AdmissionControllerTest | Admission controller scaled back to 3 06:08:17 | DEBUG | AdmissionControllerTest | Kubernetes | admission-control: Replicas=3 06:08:17 | DEBUG | AdmissionControllerTest | ApplicationHealth | 3 admission-control pods expected 06:08:17 | DEBUG | AdmissionControllerTest | ApplicationHealth | admission-control admission-control-7c9bf84889-fsbsk is in the desired state 06:08:17 | DEBUG | AdmissionControllerTest | ApplicationHealth | admission-control admission-control-7c9bf84889-k75ft is in the desired state 06:08:17 | DEBUG | AdmissionControllerTest | ApplicationHealth | admission-control admission-control-7c9bf84889-wp94p is in the desired state 06:08:17 | DEBUG | AdmissionControllerTest | ApplicationHealth | admission-control is healthy 06:08:17 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.execute(ContextImpl.java:327) at io.vertx.core.impl.ContextImpl.execute(ContextImpl.java:307) at io.vertx.core.http.impl.Http1xClientConnection.handleResponseEnd(Http1xClientConnection.java:965) at io.vertx.core.http.impl.Http1xClientConnection.handleHttpMessage(Http1xClientConnection.java:837) at io.vertx.core.http.impl.Http1xClientConnection.handleMessage(Http1xClientConnection.java:799) at io.vertx.core.net.impl.ConnectionBase.read(ConnectionBase.java:159) at io.vertx.core.net.impl.VertxHandler.channelRead(VertxHandler.java:153) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:442) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.channel.CombinedChannelDuplexHandler$DelegatingChannelHandlerContext.fireChannelRead(CombinedChannelDuplexHandler.java:436) at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:346) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:318) at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:442) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1515) at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1378) at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1427) at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:530) at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:469) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:290) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:444) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1357) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:440) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:868) at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:796) at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:732) at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:658) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:562) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest$__spock_feature_1_5_closure6.doCall(AdmissionControllerTest.groovy:565) [1 skipped] at AdmissionControllerTest$__spock_feature_1_5_closure6.doCall(AdmissionControllerTest.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) [10 skipped] at util.Helpers.withRetry(Helpers.groovy:42) at AdmissionControllerTest.$spock_feature_1_5(AdmissionControllerTest.groovy:564) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 06:08:17 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 40): Condition not satisfied: consecutiveRejectionsCount == 5 | | 1 false 06:08:22 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.execute(ContextImpl.java:327) at io.vertx.core.impl.ContextImpl.execute(ContextImpl.java:307) at io.vertx.core.http.impl.Http1xClientConnection.handleResponseEnd(Http1xClientConnection.java:965) at io.vertx.core.http.impl.Http1xClientConnection.handleHttpMessage(Http1xClientConnection.java:837) at io.vertx.core.http.impl.Http1xClientConnection.handleMessage(Http1xClientConnection.java:799) at io.vertx.core.net.impl.ConnectionBase.read(ConnectionBase.java:159) at io.vertx.core.net.impl.VertxHandler.channelRead(VertxHandler.java:153) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:442) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.channel.CombinedChannelDuplexHandler$DelegatingChannelHandlerContext.fireChannelRead(CombinedChannelDuplexHandler.java:436) at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:346) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:318) at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:442) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1515) at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1378) at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1427) at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:530) at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:469) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:290) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:444) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1357) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:440) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:868) at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:796) at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:732) at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:658) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:562) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest$__spock_feature_1_5_closure6.doCall(AdmissionControllerTest.groovy:565) [1 skipped] at AdmissionControllerTest$__spock_feature_1_5_closure6.doCall(AdmissionControllerTest.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) [10 skipped] at util.Helpers.withRetry(Helpers.groovy:42) at AdmissionControllerTest.$spock_feature_1_5(AdmissionControllerTest.groovy:564) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 06:08:22 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 5s (attempt 1 of 40): Condition not satisfied: consecutiveRejectionsCount == 5 | | 2 false 06:08:27 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.execute(ContextImpl.java:327) at io.vertx.core.impl.ContextImpl.execute(ContextImpl.java:307) at io.vertx.core.http.impl.Http1xClientConnection.handleResponseEnd(Http1xClientConnection.java:965) at io.vertx.core.http.impl.Http1xClientConnection.handleHttpMessage(Http1xClientConnection.java:837) at io.vertx.core.http.impl.Http1xClientConnection.handleMessage(Http1xClientConnection.java:799) at io.vertx.core.net.impl.ConnectionBase.read(ConnectionBase.java:159) at io.vertx.core.net.impl.VertxHandler.channelRead(VertxHandler.java:153) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:442) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.channel.CombinedChannelDuplexHandler$DelegatingChannelHandlerContext.fireChannelRead(CombinedChannelDuplexHandler.java:436) at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:346) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:318) at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:442) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1515) at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1378) at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1427) at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:530) at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:469) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:290) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:444) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1357) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:440) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:868) at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:796) at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:732) at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:658) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:562) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest$__spock_feature_1_5_closure6.doCall(AdmissionControllerTest.groovy:565) [1 skipped] at AdmissionControllerTest$__spock_feature_1_5_closure6.doCall(AdmissionControllerTest.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) [10 skipped] at util.Helpers.withRetry(Helpers.groovy:42) at AdmissionControllerTest.$spock_feature_1_5(AdmissionControllerTest.groovy:564) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 06:08:28 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 5s (attempt 2 of 40): Condition not satisfied: consecutiveRejectionsCount == 5 | | 3 false 06:08:33 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.execute(ContextImpl.java:327) at io.vertx.core.impl.ContextImpl.execute(ContextImpl.java:307) at io.vertx.core.http.impl.Http1xClientConnection.handleResponseEnd(Http1xClientConnection.java:965) at io.vertx.core.http.impl.Http1xClientConnection.handleHttpMessage(Http1xClientConnection.java:837) at io.vertx.core.http.impl.Http1xClientConnection.handleMessage(Http1xClientConnection.java:799) at io.vertx.core.net.impl.ConnectionBase.read(ConnectionBase.java:159) at io.vertx.core.net.impl.VertxHandler.channelRead(VertxHandler.java:153) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:442) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.channel.CombinedChannelDuplexHandler$DelegatingChannelHandlerContext.fireChannelRead(CombinedChannelDuplexHandler.java:436) at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:346) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:318) at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:442) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1515) at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1378) at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1427) at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:530) at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:469) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:290) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:444) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1357) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:440) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:868) at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:796) at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:732) at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:658) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:562) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest$__spock_feature_1_5_closure6.doCall(AdmissionControllerTest.groovy:565) [1 skipped] at AdmissionControllerTest$__spock_feature_1_5_closure6.doCall(AdmissionControllerTest.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) [10 skipped] at util.Helpers.withRetry(Helpers.groovy:42) at AdmissionControllerTest.$spock_feature_1_5(AdmissionControllerTest.groovy:564) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 06:08:33 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 5s (attempt 3 of 40): Condition not satisfied: consecutiveRejectionsCount == 5 | | 4 false 06:08:38 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.execute(ContextImpl.java:327) at io.vertx.core.impl.ContextImpl.execute(ContextImpl.java:307) at io.vertx.core.http.impl.Http1xClientConnection.handleResponseEnd(Http1xClientConnection.java:965) at io.vertx.core.http.impl.Http1xClientConnection.handleHttpMessage(Http1xClientConnection.java:837) at io.vertx.core.http.impl.Http1xClientConnection.handleMessage(Http1xClientConnection.java:799) at io.vertx.core.net.impl.ConnectionBase.read(ConnectionBase.java:159) at io.vertx.core.net.impl.VertxHandler.channelRead(VertxHandler.java:153) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:442) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.channel.CombinedChannelDuplexHandler$DelegatingChannelHandlerContext.fireChannelRead(CombinedChannelDuplexHandler.java:436) at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:346) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:318) at io.netty.channel.CombinedChannelDuplexHandler.channelRead(CombinedChannelDuplexHandler.java:251) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:442) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1515) at io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1378) at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1427) at io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:530) at io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:469) at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:290) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:444) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1357) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:440) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:868) at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:166) at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:796) at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:732) at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:658) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:562) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-lgh6yb7x-f5cb2.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest$__spock_feature_1_5_closure6.doCall(AdmissionControllerTest.groovy:565) [1 skipped] at AdmissionControllerTest$__spock_feature_1_5_closure6.doCall(AdmissionControllerTest.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) [10 skipped] at util.Helpers.withRetry(Helpers.groovy:42) at AdmissionControllerTest.$spock_feature_1_5(AdmissionControllerTest.groovy:564) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 06:08:39 | INFO | AdmissionControllerTest | Kubernetes | Scaled the deployment sensor to 1 06:08:39 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:40 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:41 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:42 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:43 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:44 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:45 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:46 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:47 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:48 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:49 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:50 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:51 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:52 | DEBUG | AdmissionControllerTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:08:53 | DEBUG | AdmissionControllerTest | Helpers | Calling AdmissionControllerTest.waitForSensorHealthy with 30 retries 06:08:53 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 0 of 30): Condition not satisfied: status.sensorHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | DEGRADED | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: DEGRADED collector_health_status: HEALTHY overall_health_status: DEGRADED last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:08:56 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 1 of 30): Condition not satisfied: status.sensorHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | DEGRADED | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: DEGRADED collector_health_status: HEALTHY overall_health_status: DEGRADED last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:08:59 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 2 of 30): Condition not satisfied: status.sensorHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | DEGRADED | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: DEGRADED collector_health_status: HEALTHY overall_health_status: DEGRADED last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:09:02 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 3 of 30): Condition not satisfied: status.sensorHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | DEGRADED | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: DEGRADED collector_health_status: HEALTHY overall_health_status: DEGRADED last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:09:05 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 4 of 30): Condition not satisfied: status.sensorHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | DEGRADED | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: DEGRADED collector_health_status: HEALTHY overall_health_status: DEGRADED last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:09:08 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 5 of 30): Condition not satisfied: status.sensorHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | DEGRADED | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: DEGRADED collector_health_status: HEALTHY overall_health_status: DEGRADED last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:09:11 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 6 of 30): Condition not satisfied: status.sensorHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | DEGRADED | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: DEGRADED collector_health_status: HEALTHY overall_health_status: DEGRADED last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:09:15 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 7 of 30): Condition not satisfied: status.sensorHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | DEGRADED | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: DEGRADED collector_health_status: HEALTHY overall_health_status: DEGRADED last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:09:18 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 8 of 30): Condition not satisfied: status.sensorHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | DEGRADED | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-8-gec8a0b3bd7" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: DEGRADED collector_health_status: HEALTHY overall_health_status: DEGRADED last_contact { seconds: 1761890803 nanos: 605671000 } health_info_complete: true id: "c82067c8-51ad-4080-b8e4-2ab4baabf49e" 06:09:21 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify admission controller performs image scans if Sensor is Unavailable PASSED AdmissionControllerTest STANDARD_OUT 06:09:21 | DEBUG | AdmissionControllerTest | Kubernetes | Waiting for namespace qa-admission-controller-test to be deleted 06:09:21 | DEBUG | AdmissionControllerTest | Kubernetes | Retrying in 3... 06:09:24 | DEBUG | AdmissionControllerTest | Kubernetes | Retrying in 3... 06:09:27 | DEBUG | AdmissionControllerTest | Kubernetes | K8s found that namespace qa-admission-controller-test was deleted 06:09:27 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testsuite 06:09:27 | INFO | AdmissionControllerTest | AdmissionControllerTest | Checking if cluster is healthy after test 06:09:27 | DEBUG | AdmissionControllerTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ComplianceTest STANDARD_OUT 06:09:27 | INFO | ComplianceTest | ComplianceTest | Starting testsuite 06:09:27 | DEBUG | ComplianceTest | ImageIntegrationService | Integration tested: gcr 06:09:27 | DEBUG | ComplianceTest | ImageIntegrationService | Integration created: gcr: 800d695e-dd27-4a81-af4a-acddf3581a87 06:09:27 | DEBUG | ComplianceTest | ImageIntegrationService | Integration found after creation: gcr: 800d695e-dd27-4a81-af4a-acddf3581a87 06:09:57 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 06:09:58 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered all compliance runs 06:09:58 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the runs to finish... 06:10:05 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance runs took 7.128s ComplianceTest > Verify failed run result STANDARD_OUT 06:10:05 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify failed run result 06:10:11 | DEBUG | ComplianceTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:10:12 | DEBUG | ComplianceTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:10:13 | DEBUG | ComplianceTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:10:14 | DEBUG | ComplianceTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:10:15 | DEBUG | ComplianceTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:10:16 | DEBUG | ComplianceTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:10:17 | DEBUG | ComplianceTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:10:18 | DEBUG | ComplianceTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:10:19 | DEBUG | ComplianceTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:10:21 | DEBUG | ComplianceTest | Kubernetes | waiting for sensor to come back online. Trying again in 1s... 06:10:22 | INFO | ComplianceTest | ComplianceTest | waited 10317ms for sensor to come back online 06:10:22 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify failed run result PASSED ComplianceTest STANDARD_OUT 06:10:22 | DEBUG | ComplianceTest | ImageIntegrationService | Image integration deleted: 800d695e-dd27-4a81-af4a-acddf3581a87 06:10:22 | INFO | ComplianceTest | ComplianceTest | Ending testsuite 06:10:22 | INFO | ComplianceTest | ComplianceTest | Checking if cluster is healthy after test 06:10:22 | DEBUG | ComplianceTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries 06:10:22 | INFO | | BaseSpecification | Performing global shutdown 06:10:22 | INFO | | RoleService | Deleted role: Test Automation Role - 97833 and permission set 06:10:22 | INFO | | BaseSpecification | Removing core image registry integration 06:10:22 | DEBUG | | ImageIntegrationService | Image integration deleted: 2de9068f-ab5f-4e25-a457-28d098dab5e5 [Incubating] Problems report is available at: file:///go/src/github.com/stackrox/stackrox/qa-tests-backend/build/reports/problems/problems-report.html Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0. You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins. For more on this, please refer to https://docs.gradle.org/8.13/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation. BUILD SUCCESSFUL in 4m 7s 14 actionable tasks: 2 executed, 12 up-to-date make: Leaving directory '/go/src/github.com/stackrox/stackrox/qa-tests-backend' INFO: Fri Oct 31 06:10:22 UTC 2025: Copying qa-tests-backend results to part-2-tests INFO: Fri Oct 31 06:10:22 UTC 2025: Copying test results from qa-tests-backend/build/test-results/testSensorBounce to part-2-tests INFO: Fri Oct 31 06:10:22 UTC 2025: Copying test results from qa-tests-backend/build/test-results/testSensorBounceNext to part-2-tests **** **** 06:10:22: test completed [QA tests part II] **** **** **** 06:10:22: About to run post test [QA tests part II] **** 06:10:22: Running post command: ['scripts/ci/collect-collector-metrics.sh', 'stackrox', '/tmp/collector-metrics'] . set up port-forwarding from collector-cmgmb:9090 to localhost:9090 finished download collector-cmgmb.txt finished tear down of port-forwarding from collector-cmgmb:9090 to localhost:9090 . set up port-forwarding from collector-dnv9p:9090 to localhost:9090 finished download collector-dnv9p.txt finished tear down of port-forwarding from collector-dnv9p:9090 to localhost:9090 . set up port-forwarding from collector-nhmnm:9090 to localhost:9090 finished download collector-nhmnm.txt finished tear down of port-forwarding from collector-nhmnm:9090 to localhost:9090 . set up port-forwarding from collector-pj5kz:9090 to localhost:9090 finished download collector-pj5kz.txt finished tear down of port-forwarding from collector-pj5kz:9090 to localhost:9090 . set up port-forwarding from collector-s9bvx:9090 to localhost:9090 finished download collector-s9bvx.txt finished tear down of port-forwarding from collector-s9bvx:9090 to localhost:9090 . set up port-forwarding from collector-v2g62:9090 to localhost:9090 finished download collector-v2g62.txt finished tear down of port-forwarding from collector-v2g62:9090 to localhost:9090 06:10:53: Running post command: ['tests/e2e/lib.sh', 'wait_for_api'] INFO: Fri Oct 31 06:10:53 UTC 2025: Waiting for Central to be ready in namespace stackrox INFO: Fri Oct 31 06:10:53 UTC 2025: Waiting 600s (increased for openshift-ci provisioned clusters) for central api and 3600 for ingress... INFO: Fri Oct 31 06:10:53 UTC 2025: Waiting for deployment central to be ready in namespace stackrox INFO: Fri Oct 31 06:11:03 UTC 2025: Deployment central is ready in namespace stackrox. INFO: Fri Oct 31 06:11:03 UTC 2025: Central deployment is ready in namespace stackrox. INFO: Fri Oct 31 06:11:03 UTC 2025: Waiting for Central API endpoint INFO: Fri Oct 31 06:11:03 UTC 2025: Found ingress endpoint: a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com INFO: Fri Oct 31 06:11:03 UTC 2025: Attempting to get 6 'ok' responses in a row from https://a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com:443/v1/ping INFO: Fri Oct 31 06:11:04 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:11:06 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:11:08 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:11:10 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:11:12 UTC 2025: Status is now: ok 06:11:14: Running post command: ['scripts/ci/lib.sh', 'get_central_debug_dump', 'debug-dump'] INFO: Fri Oct 31 06:11:14 UTC 2025: Getting a central debug dump INFO: Retrieving debug metrics. This may take a couple of minutes... INFO: Successfully wrote debug zip file to "debug-dump/stackrox_debug_2025_10_31_06_11_14.zip" total 1640 -rw-r--r--. 1 1001050000 root 815422 Oct 31 05:56 stackrox_debug_2025_10_31_05_56_17.zip -rw-r--r--. 1 1001050000 root 856327 Oct 31 06:11 stackrox_debug_2025_10_31_06_11_14.zip 06:11:44: Running post command: ['scripts/ci/lib.sh', 'process_central_metrics', 'debug-dump'] INFO: Fri Oct 31 06:11:44 UTC 2025: Processing metrics from central debug dump Usage: prometheus-metric-parser [command] Available Commands: compare Compare takes two metrics files and compares them takes all the metrics and outputs them as key value pairs. It will average histograms completion Generate the autocompletion script for the specified shell help Help about any command single Single takes all the metrics and outputs them as key value pairs. It will average histograms Flags: -h, --help help for prometheus-metric-parser Use "prometheus-metric-parser [command] --help" for more information about a command. INFO: Fri Oct 31 06:11:46 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json INFO: Fri Oct 31 06:11:46 UTC 2025: Saving Big Query test records from /tmp/tmp.hvGfrZ5R8l.csv to gs://stackrox-ci-artifacts/central-metrics/upload Copying file:///tmp/tmp.hvGfrZ5R8l.csv to gs://stackrox-ci-artifacts/central-metrics/upload/tmp.hvGfrZ5R8l.csv .. 06:11:48: Running post command: ['scripts/ci/lib.sh', 'get_central_diagnostics', 'diagnostic-bundle'] INFO: Fri Oct 31 06:11:48 UTC 2025: Getting central diagnostics INFO: Downloading diagnostic bundle... INFO: Successfully wrote diagnostic zip file to "diagnostic-bundle/stackrox_diagnostic_2025_10_31_06_11_48.zip" total 3752 -rw-r--r--. 1 1001050000 root 1971002 Oct 31 05:57 stackrox_diagnostic_2025_10_31_05_56_59.zip -rw-r--r--. 1 1001050000 root 1867562 Oct 31 06:12 stackrox_diagnostic_2025_10_31_06_11_48.zip 06:12:08: Running post command: ['scripts/grab-data-from-central.sh', 'central-data'] 0.0 b [>>------------------------------------------------] 0.0 b/s central-data/postgres_db_2025_10_31_06_12_09.sql.zip 15.1 MiB [>>>------------------------------------------] 4.2 MiB/s central-data/postgres_db_2025_10_31_06_12_09.sql.zip Wrote backup file to "central-data/postgres_db_2025_10_31_06_12_09.sql.zip" Pulling StackRox policies Will pull 87 policies from StackRox 06:12:19: Running post command: ['scripts/ci/collect-service-logs.sh', 'stackrox', '/tmp/k8s-service-logs/part-2/k8s-logs'] NAME STATUS AGE stackrox Active 107m INFO: Fri Oct 31 06:12:19 UTC 2025: >>> Collecting from namespace stackrox <<< INFO: Fri Oct 31 06:12:19 UTC 2025: >>> Collecting daemonsets from namespace stackrox <<< NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR collector 6 6 6 6 6 104m collector,compliance,node-inventory quay.io/rhacs-eng/collector:3.23.x-8-gec8a0b3bd7,quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6,quay.io/rhacs-eng/scanner-slim:2.37.x-112-gde9f7c100e service=collector INFO: Fri Oct 31 06:12:20 UTC 2025: >>> Collecting deployments from namespace stackrox <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR admission-control 3/3 3 3 104m admission-control quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6 app=admission-control central 1/1 1 1 106m central quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6 app=central central-db 1/1 1 1 106m central-db quay.io/rhacs-eng/central-db:4.10.x-207-g071f40eed6 app=central-db config-controller 1/1 1 1 106m manager quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6 app=config-controller scanner 1/1 1 1 106m scanner quay.io/rhacs-eng/scanner:2.37.x-112-gde9f7c100e app=scanner scanner-db 1/1 1 1 106m db quay.io/rhacs-eng/scanner-db:2.37.x-112-gde9f7c100e app=scanner-db sensor 1/1 1 1 104m sensor quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6 app=sensor webhookserver 1/1 1 1 103m webhookserver quay.io/rhacs-eng/qa-multi-arch:webhookserver-1.2 app=webhookserver INFO: Fri Oct 31 06:12:25 UTC 2025: >>> Collecting services from namespace stackrox <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR admission-control ClusterIP 172.30.19.69 443/TCP 104m app=admission-control central ClusterIP 172.30.45.18 443/TCP,9091/TCP 107m app=central central-db ClusterIP 172.30.22.117 5432/TCP 107m app=central-db central-loadbalancer LoadBalancer 172.30.184.127 a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com 443:31351/TCP 107m app=central scanner ClusterIP 172.30.30.4 8080/TCP,8443/TCP 107m app=scanner scanner-db ClusterIP 172.30.251.222 5432/TCP 107m app=scanner-db sensor ClusterIP 172.30.63.173 443/TCP,9091/TCP 104m app=sensor sensor-webhook ClusterIP 172.30.9.250 443/TCP 104m app=sensor webhookserver ClusterIP 172.30.145.22 8080/TCP,8443/TCP 103m app=webhookserver INFO: Fri Oct 31 06:12:30 UTC 2025: >>> Collecting pods from namespace stackrox <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES admission-control-7c9bf84889-fsbsk 1/1 Running 0 4m22s 10.131.0.228 ip-10-0-72-187.ec2.internal admission-control-7c9bf84889-k75ft 1/1 Running 0 4m22s 10.129.2.59 ip-10-0-28-116.ec2.internal admission-control-7c9bf84889-wp94p 1/1 Running 0 4m22s 10.128.2.33 ip-10-0-7-77.ec2.internal central-795644c465-msqhx 1/1 Running 0 107m 10.129.2.30 ip-10-0-28-116.ec2.internal central-db-84b98c8889-fzcq2 1/1 Running 0 107m 10.128.2.19 ip-10-0-7-77.ec2.internal collector-cmgmb 3/3 Running 0 104m 10.128.2.23 ip-10-0-7-77.ec2.internal collector-dnv9p 3/3 Running 0 104m 10.129.2.33 ip-10-0-28-116.ec2.internal collector-nhmnm 3/3 Running 0 104m 10.128.0.72 ip-10-0-119-203.ec2.internal collector-pj5kz 3/3 Running 0 104m 10.131.0.24 ip-10-0-72-187.ec2.internal collector-s9bvx 3/3 Running 0 104m 10.129.0.84 ip-10-0-52-51.ec2.internal collector-v2g62 3/3 Running 0 104m 10.130.0.93 ip-10-0-40-239.ec2.internal config-controller-5f68659754-56qpc 1/1 Running 0 107m 10.129.2.28 ip-10-0-28-116.ec2.internal scanner-7487f9cbb8-mchmc 1/1 Running 0 107m 10.131.0.21 ip-10-0-72-187.ec2.internal scanner-db-74f98cd84d-7sg42 1/1 Running 0 107m 10.129.2.29 ip-10-0-28-116.ec2.internal sensor-7b4784c4d5-9ffg4 1/1 Running 0 2m25s 10.131.0.229 ip-10-0-72-187.ec2.internal webhookserver-84f798856c-55slf 1/1 Running 0 104m 10.131.0.25 ip-10-0-72-187.ec2.internal INFO: Fri Oct 31 06:12:31 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-fsbsk current container admission-control in stackrox... INFO: Fri Oct 31 06:12:31 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-fsbsk current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:12:32 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-k75ft current container admission-control in stackrox... INFO: Fri Oct 31 06:12:32 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-k75ft current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:12:33 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-wp94p current container admission-control in stackrox... INFO: Fri Oct 31 06:12:33 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-wp94p current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:12:34 UTC 2025: Dumping log of pods/central-795644c465-msqhx current container central in stackrox... INFO: Fri Oct 31 06:12:35 UTC 2025: Dumping log of pods/central-db-84b98c8889-fzcq2 current container central-db in stackrox... INFO: Fri Oct 31 06:12:35 UTC 2025: Dumping log of pods/central-db-84b98c8889-fzcq2 current container init-db in stackrox... INFO: Fri Oct 31 06:12:36 UTC 2025: Dumping log of pods/collector-cmgmb current container collector in stackrox... INFO: Fri Oct 31 06:12:36 UTC 2025: Dumping log of pods/collector-cmgmb current container compliance in stackrox... INFO: Fri Oct 31 06:12:36 UTC 2025: Dumping log of pods/collector-cmgmb current container node-inventory in stackrox... INFO: Fri Oct 31 06:12:37 UTC 2025: Dumping log of pods/collector-cmgmb current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:12:38 UTC 2025: Dumping log of pods/collector-dnv9p current container collector in stackrox... INFO: Fri Oct 31 06:12:38 UTC 2025: Dumping log of pods/collector-dnv9p current container compliance in stackrox... INFO: Fri Oct 31 06:12:38 UTC 2025: Dumping log of pods/collector-dnv9p current container node-inventory in stackrox... INFO: Fri Oct 31 06:12:38 UTC 2025: Dumping log of pods/collector-dnv9p current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:12:39 UTC 2025: Dumping log of pods/collector-nhmnm current container collector in stackrox... INFO: Fri Oct 31 06:12:39 UTC 2025: Dumping log of pods/collector-nhmnm current container compliance in stackrox... INFO: Fri Oct 31 06:12:40 UTC 2025: Dumping log of pods/collector-nhmnm current container node-inventory in stackrox... INFO: Fri Oct 31 06:12:40 UTC 2025: Dumping log of pods/collector-nhmnm current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:12:41 UTC 2025: Dumping log of pods/collector-pj5kz current container collector in stackrox... INFO: Fri Oct 31 06:12:41 UTC 2025: Dumping log of pods/collector-pj5kz current container compliance in stackrox... INFO: Fri Oct 31 06:12:41 UTC 2025: Dumping log of pods/collector-pj5kz current container node-inventory in stackrox... INFO: Fri Oct 31 06:12:42 UTC 2025: Dumping log of pods/collector-pj5kz current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:12:42 UTC 2025: Dumping log of pods/collector-s9bvx current container collector in stackrox... INFO: Fri Oct 31 06:12:43 UTC 2025: Dumping log of pods/collector-s9bvx current container compliance in stackrox... INFO: Fri Oct 31 06:12:43 UTC 2025: Dumping log of pods/collector-s9bvx current container node-inventory in stackrox... INFO: Fri Oct 31 06:12:43 UTC 2025: Dumping log of pods/collector-s9bvx current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:12:44 UTC 2025: Dumping log of pods/collector-v2g62 current container collector in stackrox... INFO: Fri Oct 31 06:12:44 UTC 2025: Dumping log of pods/collector-v2g62 current container compliance in stackrox... INFO: Fri Oct 31 06:12:44 UTC 2025: Dumping log of pods/collector-v2g62 current container node-inventory in stackrox... INFO: Fri Oct 31 06:12:45 UTC 2025: Dumping log of pods/collector-v2g62 current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:12:46 UTC 2025: Dumping log of pods/config-controller-5f68659754-56qpc current container manager in stackrox... INFO: Fri Oct 31 06:12:46 UTC 2025: Dumping log of pods/scanner-7487f9cbb8-mchmc current container scanner in stackrox... INFO: Fri Oct 31 06:12:47 UTC 2025: Dumping log of pods/scanner-db-74f98cd84d-7sg42 current container db in stackrox... INFO: Fri Oct 31 06:12:48 UTC 2025: Dumping log of pods/scanner-db-74f98cd84d-7sg42 current container init-db in stackrox... INFO: Fri Oct 31 06:12:48 UTC 2025: Dumping log of pods/sensor-7b4784c4d5-9ffg4 current container sensor in stackrox... INFO: Fri Oct 31 06:12:49 UTC 2025: Dumping log of pods/sensor-7b4784c4d5-9ffg4 current container crs in stackrox... INFO: Fri Oct 31 06:12:49 UTC 2025: Dumping log of pods/sensor-7b4784c4d5-9ffg4 current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:12:50 UTC 2025: Dumping log of pods/webhookserver-84f798856c-55slf current container webhookserver in stackrox... INFO: Fri Oct 31 06:12:50 UTC 2025: >>> Collecting secrets from namespace stackrox <<< NAME TYPE DATA AGE admission-control-dockercfg-p8bhn kubernetes.io/dockercfg 1 105m admission-control-tls Opaque 3 105m builder-dockercfg-df9sv kubernetes.io/dockercfg 1 108m central-admin-pass Opaque 1 108m central-db-dockercfg-75lrj kubernetes.io/dockercfg 1 107m central-db-password Opaque 1 107m central-db-tls Opaque 3 107m central-default-tls-secret kubernetes.io/tls 2 108m central-dockercfg-vfb6p kubernetes.io/dockercfg 1 107m central-htpasswd Opaque 1 107m central-monitoring-tls kubernetes.io/tls 2 107m central-stackrox-central-services-proxy-env Opaque 1 107m central-tls Opaque 5 107m collector-dockercfg-npd4p kubernetes.io/dockercfg 1 105m collector-tls Opaque 3 105m config-controller-dockercfg-c7wx7 kubernetes.io/dockercfg 1 107m default-dockercfg-g7xzt kubernetes.io/dockercfg 1 108m deployer-dockercfg-n4tck kubernetes.io/dockercfg 1 108m helm-cluster-config Opaque 1 105m scanner-db-password Opaque 1 107m scanner-db-tls Opaque 3 107m scanner-dockercfg-lvf9z kubernetes.io/dockercfg 1 107m scanner-tls Opaque 3 107m securedcluster-stackrox-secured-cluster-services-proxy-env Opaque 1 105m sensor-dockercfg-jr4kf kubernetes.io/dockercfg 1 105m sensor-monitoring-tls kubernetes.io/tls 2 105m sensor-tls Opaque 3 105m service-ca Opaque 1 105m sh.helm.release.v1.stackrox-central-services.v1 helm.sh/release.v1 1 107m sh.helm.release.v1.stackrox-secured-cluster-services.v1 helm.sh/release.v1 1 105m sh.helm.release.v1.webhookserver.v1 helm.sh/release.v1 1 104m stackrox kubernetes.io/dockerconfigjson 1 108m tls-cert-admission-control Opaque 3 105m tls-cert-collector Opaque 3 105m tls-cert-scanner Opaque 3 105m tls-cert-scanner-db Opaque 3 105m tls-cert-scanner-v4-db Opaque 3 105m tls-cert-scanner-v4-indexer Opaque 3 105m tls-cert-sensor Opaque 3 105m webhook-server-certs Opaque 2 104m INFO: Fri Oct 31 06:13:11 UTC 2025: >>> Collecting serviceaccounts from namespace stackrox <<< NAME SECRETS AGE admission-control 1 105m builder 1 108m central 1 107m central-db 1 107m collector 1 105m config-controller 1 107m default 1 108m deployer 1 108m scanner 1 107m sensor 1 105m INFO: Fri Oct 31 06:13:18 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace stackrox <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 132m autoscaling.openshift.io 2 149m cluster-baremetal-validating-webhook-configuration 1 149m controlplanemachineset.machine.openshift.io 1 146m machine-api 2 149m monitoringconfigmaps.openshift.io 1 130m multus.openshift.io 1 151m network-node-identity.openshift.io 2 134m performance-addon-operator 1 156m prometheusrules.openshift.io 1 132m stackrox 2 105m INFO: Fri Oct 31 06:13:25 UTC 2025: >>> Collecting catalogsources from namespace stackrox <<< No resources found in stackrox namespace. INFO: Fri Oct 31 06:13:25 UTC 2025: >>> Collecting subscriptions from namespace stackrox <<< No resources found in stackrox namespace. INFO: Fri Oct 31 06:13:25 UTC 2025: >>> Collecting clusterserviceversions from namespace stackrox <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:13:26 UTC 2025: >>> Collecting central from namespace stackrox <<< NAME AGE stackrox-central-services 108m INFO: Fri Oct 31 06:13:27 UTC 2025: >>> Collecting securedclusters from namespace stackrox <<< NAME AGE stackrox-secured-cluster-services 106m INFO: Fri Oct 31 06:13:28 UTC 2025: >>> Collecting nodes from namespace stackrox <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 154m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 133m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 154m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 154m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 133m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 133m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:13:34: Running post command: ['scripts/ci/collect-service-logs.sh', 'stackrox-operator', '/tmp/k8s-service-logs/part-2/k8s-logs'] NAME STATUS AGE stackrox-operator Active 109m INFO: Fri Oct 31 06:13:34 UTC 2025: >>> Collecting from namespace stackrox-operator <<< INFO: Fri Oct 31 06:13:34 UTC 2025: >>> Collecting daemonsets from namespace stackrox-operator <<< No resources found in stackrox-operator namespace. INFO: Fri Oct 31 06:13:34 UTC 2025: >>> Collecting deployments from namespace stackrox-operator <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR rhacs-operator-controller-manager 1/1 1 1 109m manager quay.io/rhacs-eng/stackrox-operator:4.10.0-207-g071f40eed6 app=rhacs-operator,control-plane=controller-manager INFO: Fri Oct 31 06:13:35 UTC 2025: >>> Collecting services from namespace stackrox-operator <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR rhacs-operator-controller-manager-metrics-service ClusterIP 172.30.22.238 8443/TCP 109m app=rhacs-operator,control-plane=controller-manager stackrox-operator-test-index ClusterIP 172.30.39.158 50051/TCP 109m olm.catalogSource=stackrox-operator-test-index,olm.managed=true INFO: Fri Oct 31 06:13:36 UTC 2025: >>> Collecting pods from namespace stackrox-operator <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES 2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq 0/1 Completed 0 109m 10.129.2.25 ip-10-0-28-116.ec2.internal rhacs-operator-controller-manager-7b9d48dc97-n6jrj 1/1 Running 0 109m 10.129.2.27 ip-10-0-28-116.ec2.internal stackrox-operator-test-index-q698h 1/1 Running 0 109m 10.129.2.24 ip-10-0-28-116.ec2.internal INFO: Fri Oct 31 06:13:37 UTC 2025: Dumping log of pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq current container extract in stackrox-operator... INFO: Fri Oct 31 06:13:37 UTC 2025: Dumping log of pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq current container util in stackrox-operator... INFO: Fri Oct 31 06:13:38 UTC 2025: Dumping log of pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq current container pull in stackrox-operator... INFO: Fri Oct 31 06:13:38 UTC 2025: Dumping log of pods/rhacs-operator-controller-manager-7b9d48dc97-n6jrj current container manager in stackrox-operator... INFO: Fri Oct 31 06:13:39 UTC 2025: Dumping log of pods/stackrox-operator-test-index-q698h current container registry-server in stackrox-operator... INFO: Fri Oct 31 06:13:39 UTC 2025: >>> Collecting secrets from namespace stackrox-operator <<< NAME TYPE DATA AGE builder-dockercfg-ldfjm kubernetes.io/dockercfg 1 109m default-dockercfg-hk546 kubernetes.io/dockercfg 1 109m deployer-dockercfg-d5lwg kubernetes.io/dockercfg 1 109m rhacs-operator-controller-manager-dockercfg-8tq26 kubernetes.io/dockercfg 1 109m stackrox-operator-test-index-dockercfg-k8tbd kubernetes.io/dockercfg 1 109m INFO: Fri Oct 31 06:13:42 UTC 2025: >>> Collecting serviceaccounts from namespace stackrox-operator <<< NAME SECRETS AGE builder 1 109m default 1 109m deployer 1 109m rhacs-operator-controller-manager 1 109m stackrox-operator-test-index 1 109m INFO: Fri Oct 31 06:13:45 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace stackrox-operator <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 132m autoscaling.openshift.io 2 150m cluster-baremetal-validating-webhook-configuration 1 150m controlplanemachineset.machine.openshift.io 1 147m machine-api 2 150m monitoringconfigmaps.openshift.io 1 130m multus.openshift.io 1 151m network-node-identity.openshift.io 2 134m performance-addon-operator 1 157m prometheusrules.openshift.io 1 132m stackrox 2 106m INFO: Fri Oct 31 06:13:52 UTC 2025: >>> Collecting catalogsources from namespace stackrox-operator <<< NAME DISPLAY TYPE PUBLISHER AGE stackrox-operator-test-index StackRox Operator Test index grpc 110m INFO: Fri Oct 31 06:13:53 UTC 2025: >>> Collecting subscriptions from namespace stackrox-operator <<< NAME PACKAGE SOURCE CHANNEL stackrox-operator-test-subscription rhacs-operator stackrox-operator-test-index latest INFO: Fri Oct 31 06:13:54 UTC 2025: >>> Collecting clusterserviceversions from namespace stackrox-operator <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:13:55 UTC 2025: >>> Collecting central from namespace stackrox-operator <<< No resources found in stackrox-operator namespace. INFO: Fri Oct 31 06:13:55 UTC 2025: >>> Collecting securedclusters from namespace stackrox-operator <<< No resources found in stackrox-operator namespace. INFO: Fri Oct 31 06:13:55 UTC 2025: >>> Collecting nodes from namespace stackrox-operator <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 154m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 134m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 154m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 154m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 134m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 134m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:14:01: Running post command: ['scripts/ci/collect-service-logs.sh', 'proxies', '/tmp/k8s-service-logs/part-2/k8s-logs'] Error from server (NotFound): namespaces "proxies" not found INFO: Fri Oct 31 06:14:01 UTC 2025: Skipping missing namespace proxies 06:14:01: Running post command: ['scripts/ci/collect-service-logs.sh', 'squid', '/tmp/k8s-service-logs/part-2/k8s-logs'] Error from server (NotFound): namespaces "squid" not found INFO: Fri Oct 31 06:14:01 UTC 2025: Skipping missing namespace squid 06:14:01: Running post command: ['scripts/ci/collect-service-logs.sh', 'kube-system', '/tmp/k8s-service-logs/part-2/k8s-logs'] NAME STATUS AGE kube-system Active 159m INFO: Fri Oct 31 06:14:01 UTC 2025: >>> Collecting from namespace kube-system <<< INFO: Fri Oct 31 06:14:01 UTC 2025: >>> Collecting daemonsets from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 06:14:01 UTC 2025: >>> Collecting deployments from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 06:14:02 UTC 2025: >>> Collecting services from namespace kube-system <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR kubelet ClusterIP None 10250/TCP,10255/TCP,4194/TCP 133m INFO: Fri Oct 31 06:14:02 UTC 2025: >>> Collecting pods from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 06:14:03 UTC 2025: >>> Collecting secrets from namespace kube-system <<< NAME TYPE DATA AGE attachdetach-controller-dockercfg-zvdml kubernetes.io/dockercfg 1 137m aws-cloud-provider-dockercfg-llnl8 kubernetes.io/dockercfg 1 137m aws-creds Opaque 2 158m builder-dockercfg-5rr4n kubernetes.io/dockercfg 1 137m certificate-controller-dockercfg-4ts9j kubernetes.io/dockercfg 1 137m cloud-controller-manager-dockercfg-vcvql kubernetes.io/dockercfg 1 137m clusterrole-aggregation-controller-dockercfg-2d25d kubernetes.io/dockercfg 1 137m cronjob-controller-dockercfg-bwfcs kubernetes.io/dockercfg 1 137m daemon-set-controller-dockercfg-7rmq8 kubernetes.io/dockercfg 1 137m default-dockercfg-tqc2v kubernetes.io/dockercfg 1 137m deployer-dockercfg-5j8f4 kubernetes.io/dockercfg 1 137m deployment-controller-dockercfg-7zlhp kubernetes.io/dockercfg 1 137m disruption-controller-dockercfg-k4jbk kubernetes.io/dockercfg 1 137m endpoint-controller-dockercfg-hsjvf kubernetes.io/dockercfg 1 137m endpointslice-controller-dockercfg-ckxq9 kubernetes.io/dockercfg 1 137m endpointslicemirroring-controller-dockercfg-78tkf kubernetes.io/dockercfg 1 137m ephemeral-volume-controller-dockercfg-pj977 kubernetes.io/dockercfg 1 137m expand-controller-dockercfg-c7q6p kubernetes.io/dockercfg 1 137m generic-garbage-collector-dockercfg-k4nd7 kubernetes.io/dockercfg 1 137m horizontal-pod-autoscaler-dockercfg-jxc9l kubernetes.io/dockercfg 1 137m job-controller-dockercfg-6ggtw kubernetes.io/dockercfg 1 137m kube-cloud-cfg Opaque 1 158m kubeadmin Opaque 1 158m legacy-service-account-token-cleaner-dockercfg-4nmmn kubernetes.io/dockercfg 1 137m namespace-controller-dockercfg-8fvgf kubernetes.io/dockercfg 1 137m node-controller-dockercfg-knp2g kubernetes.io/dockercfg 1 137m persistent-volume-binder-dockercfg-cdn7t kubernetes.io/dockercfg 1 137m pod-garbage-collector-dockercfg-btkfm kubernetes.io/dockercfg 1 137m pv-protection-controller-dockercfg-csndt kubernetes.io/dockercfg 1 137m pvc-protection-controller-dockercfg-44w8f kubernetes.io/dockercfg 1 137m replicaset-controller-dockercfg-lrfp5 kubernetes.io/dockercfg 1 137m replication-controller-dockercfg-z7j2d kubernetes.io/dockercfg 1 137m resourcequota-controller-dockercfg-xlkzs kubernetes.io/dockercfg 1 137m root-ca-cert-publisher-dockercfg-v6666 kubernetes.io/dockercfg 1 137m selinux-warning-controller-dockercfg-jh2l9 kubernetes.io/dockercfg 1 137m service-account-controller-dockercfg-w88mk kubernetes.io/dockercfg 1 137m service-ca-cert-publisher-dockercfg-p6bbk kubernetes.io/dockercfg 1 137m service-cidrs-controller-dockercfg-zjjhc kubernetes.io/dockercfg 1 137m service-controller-dockercfg-dqxjf kubernetes.io/dockercfg 1 137m statefulset-controller-dockercfg-g78jw kubernetes.io/dockercfg 1 137m ttl-after-finished-controller-dockercfg-x8msd kubernetes.io/dockercfg 1 137m validatingadmissionpolicy-status-controller-dockercfg-f5l8m kubernetes.io/dockercfg 1 137m volumeattributesclass-protection-controller-dockercfg-z8c9t kubernetes.io/dockercfg 1 137m INFO: Fri Oct 31 06:14:25 UTC 2025: >>> Collecting serviceaccounts from namespace kube-system <<< NAME SECRETS AGE attachdetach-controller 1 159m aws-cloud-provider 1 154m builder 1 138m certificate-controller 1 159m cloud-controller-manager 1 157m clusterrole-aggregation-controller 1 159m cronjob-controller 1 159m daemon-set-controller 1 159m default 1 159m deployer 1 138m deployment-controller 1 159m disruption-controller 1 159m endpoint-controller 1 159m endpointslice-controller 1 159m endpointslicemirroring-controller 1 159m ephemeral-volume-controller 1 159m expand-controller 1 159m generic-garbage-collector 1 159m horizontal-pod-autoscaler 1 159m job-controller 1 159m legacy-service-account-token-cleaner 1 159m namespace-controller 1 159m node-controller 1 159m persistent-volume-binder 1 159m pod-garbage-collector 1 159m pv-protection-controller 1 159m pvc-protection-controller 1 159m replicaset-controller 1 159m replication-controller 1 159m resourcequota-controller 1 159m root-ca-cert-publisher 1 159m selinux-warning-controller 1 159m service-account-controller 1 159m service-ca-cert-publisher 1 159m service-cidrs-controller 1 159m service-controller 1 154m statefulset-controller 1 159m ttl-after-finished-controller 1 159m validatingadmissionpolicy-status-controller 1 159m volumeattributesclass-protection-controller 1 159m INFO: Fri Oct 31 06:14:48 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace kube-system <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 134m autoscaling.openshift.io 2 151m cluster-baremetal-validating-webhook-configuration 1 151m controlplanemachineset.machine.openshift.io 1 148m machine-api 2 151m monitoringconfigmaps.openshift.io 1 132m multus.openshift.io 1 152m network-node-identity.openshift.io 2 136m performance-addon-operator 1 158m prometheusrules.openshift.io 1 134m stackrox 2 107m INFO: Fri Oct 31 06:14:55 UTC 2025: >>> Collecting catalogsources from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 06:14:55 UTC 2025: >>> Collecting subscriptions from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 06:14:56 UTC 2025: >>> Collecting clusterserviceversions from namespace kube-system <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:14:56 UTC 2025: >>> Collecting central from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 06:14:57 UTC 2025: >>> Collecting securedclusters from namespace kube-system <<< No resources found in kube-system namespace. INFO: Fri Oct 31 06:14:57 UTC 2025: >>> Collecting nodes from namespace kube-system <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 155m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 135m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 155m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 155m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 135m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 135m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:15:03: Running post command: ['scripts/ci/collect-service-logs.sh', 'prefetch-images', '/tmp/k8s-service-logs/part-2/k8s-logs'] NAME STATUS AGE prefetch-images Active 114m INFO: Fri Oct 31 06:15:03 UTC 2025: >>> Collecting from namespace prefetch-images <<< INFO: Fri Oct 31 06:15:03 UTC 2025: >>> Collecting daemonsets from namespace prefetch-images <<< NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR qa-e2e 6 6 6 6 6 114m sleep quay.io/stackrox-io/image-prefetcher:v0.3.0 app=qa-e2e stackrox-images 6 6 6 6 6 114m sleep quay.io/stackrox-io/image-prefetcher:v0.3.0 app=stackrox-images INFO: Fri Oct 31 06:15:04 UTC 2025: >>> Collecting deployments from namespace prefetch-images <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR qa-e2e-metrics 1/1 1 1 114m aggregator quay.io/stackrox-io/image-prefetcher:v0.3.0 app=qa-e2e-metrics stackrox-images-metrics 1/1 1 1 114m aggregator quay.io/stackrox-io/image-prefetcher:v0.3.0 app=stackrox-images-metrics INFO: Fri Oct 31 06:15:06 UTC 2025: >>> Collecting services from namespace prefetch-images <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR qa-e2e-metrics LoadBalancer 172.30.165.76 adc5586cf63b748c2b5b3325581d43b1-1302466646.XXXXXXXXX.elb.amazonaws.com 8443:32301/TCP,8080:30967/TCP 114m app=qa-e2e-metrics stackrox-images-metrics LoadBalancer 172.30.232.18 a9a8f0083eb3e4e4bb05c239b9718906-1196744389.XXXXXXXXX.elb.amazonaws.com 8443:30366/TCP,8080:30746/TCP 114m app=stackrox-images-metrics INFO: Fri Oct 31 06:15:07 UTC 2025: >>> Collecting pods from namespace prefetch-images <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES qa-e2e-2k5lw 1/1 Running 0 114m 10.131.0.19 ip-10-0-72-187.ec2.internal qa-e2e-4s8tw 1/1 Running 0 114m 10.128.0.69 ip-10-0-119-203.ec2.internal qa-e2e-72nmb 1/1 Running 0 114m 10.129.0.79 ip-10-0-52-51.ec2.internal qa-e2e-hp2qk 1/1 Running 0 114m 10.130.0.90 ip-10-0-40-239.ec2.internal qa-e2e-hwkkq 1/1 Running 0 114m 10.129.2.20 ip-10-0-28-116.ec2.internal qa-e2e-metrics-7fdf959548-7g84w 1/1 Running 0 114m 10.129.2.19 ip-10-0-28-116.ec2.internal qa-e2e-wb7f5 1/1 Running 0 114m 10.128.2.17 ip-10-0-7-77.ec2.internal stackrox-images-6rqv9 1/1 Running 0 114m 10.128.0.70 ip-10-0-119-203.ec2.internal stackrox-images-bqn6c 1/1 Running 0 114m 10.129.2.22 ip-10-0-28-116.ec2.internal stackrox-images-hcczx 1/1 Running 0 114m 10.128.2.18 ip-10-0-7-77.ec2.internal stackrox-images-lhrlk 1/1 Running 0 114m 10.131.0.20 ip-10-0-72-187.ec2.internal stackrox-images-metrics-8d848757-98ctr 1/1 Running 0 114m 10.129.2.21 ip-10-0-28-116.ec2.internal stackrox-images-pvqkv 1/1 Running 0 114m 10.130.0.91 ip-10-0-40-239.ec2.internal stackrox-images-xl9cv 1/1 Running 0 114m 10.129.0.80 ip-10-0-52-51.ec2.internal INFO: Fri Oct 31 06:15:08 UTC 2025: Dumping log of pods/qa-e2e-2k5lw current container sleep in prefetch-images... INFO: Fri Oct 31 06:15:08 UTC 2025: Dumping log of pods/qa-e2e-2k5lw current container prefetch in prefetch-images... INFO: Fri Oct 31 06:15:09 UTC 2025: Dumping log of pods/qa-e2e-4s8tw current container sleep in prefetch-images... INFO: Fri Oct 31 06:15:09 UTC 2025: Dumping log of pods/qa-e2e-4s8tw current container prefetch in prefetch-images... INFO: Fri Oct 31 06:15:10 UTC 2025: Dumping log of pods/qa-e2e-72nmb current container sleep in prefetch-images... INFO: Fri Oct 31 06:15:10 UTC 2025: Dumping log of pods/qa-e2e-72nmb current container prefetch in prefetch-images... INFO: Fri Oct 31 06:15:11 UTC 2025: Dumping log of pods/qa-e2e-hp2qk current container sleep in prefetch-images... INFO: Fri Oct 31 06:15:11 UTC 2025: Dumping log of pods/qa-e2e-hp2qk current container prefetch in prefetch-images... INFO: Fri Oct 31 06:15:12 UTC 2025: Dumping log of pods/qa-e2e-hwkkq current container sleep in prefetch-images... INFO: Fri Oct 31 06:15:12 UTC 2025: Dumping log of pods/qa-e2e-hwkkq current container prefetch in prefetch-images... INFO: Fri Oct 31 06:15:13 UTC 2025: Dumping log of pods/qa-e2e-metrics-7fdf959548-7g84w current container aggregator in prefetch-images... INFO: Fri Oct 31 06:15:13 UTC 2025: Dumping log of pods/qa-e2e-wb7f5 current container sleep in prefetch-images... INFO: Fri Oct 31 06:15:14 UTC 2025: Dumping log of pods/qa-e2e-wb7f5 current container prefetch in prefetch-images... INFO: Fri Oct 31 06:15:14 UTC 2025: Dumping log of pods/stackrox-images-6rqv9 current container sleep in prefetch-images... INFO: Fri Oct 31 06:15:15 UTC 2025: Dumping log of pods/stackrox-images-6rqv9 current container prefetch in prefetch-images... INFO: Fri Oct 31 06:15:15 UTC 2025: Dumping log of pods/stackrox-images-bqn6c current container sleep in prefetch-images... INFO: Fri Oct 31 06:15:16 UTC 2025: Dumping log of pods/stackrox-images-bqn6c current container prefetch in prefetch-images... INFO: Fri Oct 31 06:15:16 UTC 2025: Dumping log of pods/stackrox-images-hcczx current container sleep in prefetch-images... INFO: Fri Oct 31 06:15:17 UTC 2025: Dumping log of pods/stackrox-images-hcczx current container prefetch in prefetch-images... INFO: Fri Oct 31 06:15:17 UTC 2025: Dumping log of pods/stackrox-images-lhrlk current container sleep in prefetch-images... INFO: Fri Oct 31 06:15:18 UTC 2025: Dumping log of pods/stackrox-images-lhrlk current container prefetch in prefetch-images... INFO: Fri Oct 31 06:15:18 UTC 2025: Dumping log of pods/stackrox-images-metrics-8d848757-98ctr current container aggregator in prefetch-images... INFO: Fri Oct 31 06:15:19 UTC 2025: Dumping log of pods/stackrox-images-pvqkv current container sleep in prefetch-images... INFO: Fri Oct 31 06:15:19 UTC 2025: Dumping log of pods/stackrox-images-pvqkv current container prefetch in prefetch-images... INFO: Fri Oct 31 06:15:20 UTC 2025: Dumping log of pods/stackrox-images-xl9cv current container sleep in prefetch-images... INFO: Fri Oct 31 06:15:20 UTC 2025: Dumping log of pods/stackrox-images-xl9cv current container prefetch in prefetch-images... INFO: Fri Oct 31 06:15:21 UTC 2025: >>> Collecting secrets from namespace prefetch-images <<< NAME TYPE DATA AGE builder-dockercfg-tlkdx kubernetes.io/dockercfg 1 114m default-dockercfg-4rgn5 kubernetes.io/dockercfg 1 114m deployer-dockercfg-c78n5 kubernetes.io/dockercfg 1 114m stackrox kubernetes.io/dockerconfigjson 1 114m INFO: Fri Oct 31 06:15:23 UTC 2025: >>> Collecting serviceaccounts from namespace prefetch-images <<< NAME SECRETS AGE builder 1 114m default 1 114m deployer 1 114m INFO: Fri Oct 31 06:15:25 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace prefetch-images <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 134m autoscaling.openshift.io 2 151m cluster-baremetal-validating-webhook-configuration 1 151m controlplanemachineset.machine.openshift.io 1 148m machine-api 2 151m monitoringconfigmaps.openshift.io 1 132m multus.openshift.io 1 153m network-node-identity.openshift.io 2 136m performance-addon-operator 1 158m prometheusrules.openshift.io 1 134m stackrox 2 107m INFO: Fri Oct 31 06:15:32 UTC 2025: >>> Collecting catalogsources from namespace prefetch-images <<< No resources found in prefetch-images namespace. INFO: Fri Oct 31 06:15:32 UTC 2025: >>> Collecting subscriptions from namespace prefetch-images <<< No resources found in prefetch-images namespace. INFO: Fri Oct 31 06:15:32 UTC 2025: >>> Collecting clusterserviceversions from namespace prefetch-images <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:15:33 UTC 2025: >>> Collecting central from namespace prefetch-images <<< No resources found in prefetch-images namespace. INFO: Fri Oct 31 06:15:33 UTC 2025: >>> Collecting securedclusters from namespace prefetch-images <<< No resources found in prefetch-images namespace. INFO: Fri Oct 31 06:15:34 UTC 2025: >>> Collecting nodes from namespace prefetch-images <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 156m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 135m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 156m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 156m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 135m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 135m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:15:39: Running post command: ['scripts/ci/collect-service-logs.sh', 'default', '/tmp/k8s-service-logs/part-2/k8s-logs'] NAME STATUS AGE default Active 161m INFO: Fri Oct 31 06:15:40 UTC 2025: >>> Collecting from namespace default <<< INFO: Fri Oct 31 06:15:40 UTC 2025: >>> Collecting daemonsets from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:15:40 UTC 2025: >>> Collecting deployments from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:15:40 UTC 2025: >>> Collecting services from namespace default <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR kubernetes ClusterIP 172.30.0.1 443/TCP 160m openshift ExternalName kubernetes.default.svc.cluster.local 151m INFO: Fri Oct 31 06:15:41 UTC 2025: >>> Collecting pods from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:15:41 UTC 2025: >>> Collecting secrets from namespace default <<< NAME TYPE DATA AGE builder-dockercfg-2n29b kubernetes.io/dockercfg 1 139m default-dockercfg-jdzpj kubernetes.io/dockercfg 1 139m deployer-dockercfg-57xth kubernetes.io/dockercfg 1 139m INFO: Fri Oct 31 06:15:43 UTC 2025: >>> Collecting serviceaccounts from namespace default <<< NAME SECRETS AGE builder 1 139m default 1 160m deployer 1 139m INFO: Fri Oct 31 06:15:45 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace default <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 134m autoscaling.openshift.io 2 152m cluster-baremetal-validating-webhook-configuration 1 152m controlplanemachineset.machine.openshift.io 1 149m machine-api 2 152m monitoringconfigmaps.openshift.io 1 132m multus.openshift.io 1 153m network-node-identity.openshift.io 2 136m performance-addon-operator 1 159m prometheusrules.openshift.io 1 134m stackrox 2 108m INFO: Fri Oct 31 06:15:52 UTC 2025: >>> Collecting catalogsources from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:15:53 UTC 2025: >>> Collecting subscriptions from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:15:53 UTC 2025: >>> Collecting clusterserviceversions from namespace default <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:15:54 UTC 2025: >>> Collecting central from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:15:54 UTC 2025: >>> Collecting securedclusters from namespace default <<< No resources found in default namespace. INFO: Fri Oct 31 06:15:54 UTC 2025: >>> Collecting nodes from namespace default <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 156m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 136m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 156m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 156m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 136m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 136m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:16:00: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-dns', '/tmp/k8s-service-logs/part-2/k8s-logs'] NAME STATUS AGE openshift-dns Active 152m INFO: Fri Oct 31 06:16:00 UTC 2025: >>> Collecting from namespace openshift-dns <<< INFO: Fri Oct 31 06:16:00 UTC 2025: >>> Collecting daemonsets from namespace openshift-dns <<< NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR dns-default 6 6 6 6 6 kubernetes.io/os=linux 152m dns,kube-rbac-proxy quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d880ec2bc1f2e70d60c1fc91af0fedb8ff2ee5261ead5356efa60c95d3ee5d6,quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:259964b66399bb8639633b6015a56f69535ce6569b99e3a913296566e4ee860d dns.operator.openshift.io/daemonset-dns=default node-resolver 6 6 6 6 6 kubernetes.io/os=linux 152m dns-node-resolver quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:491b7215b2ffbdeba1fed69677c0955dc653d109c0ec55f9b980597842d1654c dns.operator.openshift.io/daemonset-node-resolver= INFO: Fri Oct 31 06:16:02 UTC 2025: >>> Collecting deployments from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Fri Oct 31 06:16:02 UTC 2025: >>> Collecting services from namespace openshift-dns <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR dns-default ClusterIP 172.30.0.10 53/UDP,53/TCP,9154/TCP 152m dns.operator.openshift.io/daemonset-dns=default INFO: Fri Oct 31 06:16:03 UTC 2025: >>> Collecting pods from namespace openshift-dns <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES dns-default-5g8pg 2/2 Running 0 135m 10.129.2.13 ip-10-0-28-116.ec2.internal dns-default-7xm8x 2/2 Running 0 135m 10.128.2.6 ip-10-0-7-77.ec2.internal dns-default-ncbxz 2/2 Running 0 152m 10.129.0.10 ip-10-0-52-51.ec2.internal dns-default-nttfc 2/2 Running 0 135m 10.131.0.10 ip-10-0-72-187.ec2.internal dns-default-qs2bx 2/2 Running 0 152m 10.128.0.14 ip-10-0-119-203.ec2.internal dns-default-wkz9f 2/2 Running 0 152m 10.130.0.47 ip-10-0-40-239.ec2.internal node-resolver-2kkpw 1/1 Running 0 136m 10.0.28.116 ip-10-0-28-116.ec2.internal node-resolver-2zg7g 1/1 Running 0 136m 10.0.72.187 ip-10-0-72-187.ec2.internal node-resolver-4khpf 1/1 Running 0 152m 10.0.52.51 ip-10-0-52-51.ec2.internal node-resolver-ctldt 1/1 Running 0 152m 10.0.40.239 ip-10-0-40-239.ec2.internal node-resolver-pdnsn 1/1 Running 0 136m 10.0.7.77 ip-10-0-7-77.ec2.internal node-resolver-sh6p8 1/1 Running 0 152m 10.0.119.203 ip-10-0-119-203.ec2.internal INFO: Fri Oct 31 06:16:03 UTC 2025: Dumping log of pods/dns-default-5g8pg current container dns in openshift-dns... INFO: Fri Oct 31 06:16:04 UTC 2025: Dumping log of pods/dns-default-5g8pg current container kube-rbac-proxy in openshift-dns... INFO: Fri Oct 31 06:16:04 UTC 2025: Dumping log of pods/dns-default-7xm8x current container dns in openshift-dns... INFO: Fri Oct 31 06:16:05 UTC 2025: Dumping log of pods/dns-default-7xm8x current container kube-rbac-proxy in openshift-dns... INFO: Fri Oct 31 06:16:06 UTC 2025: Dumping log of pods/dns-default-ncbxz current container dns in openshift-dns... INFO: Fri Oct 31 06:16:06 UTC 2025: Dumping log of pods/dns-default-ncbxz current container kube-rbac-proxy in openshift-dns... INFO: Fri Oct 31 06:16:07 UTC 2025: Dumping log of pods/dns-default-nttfc current container dns in openshift-dns... INFO: Fri Oct 31 06:16:07 UTC 2025: Dumping log of pods/dns-default-nttfc current container kube-rbac-proxy in openshift-dns... INFO: Fri Oct 31 06:16:08 UTC 2025: Dumping log of pods/dns-default-qs2bx current container dns in openshift-dns... INFO: Fri Oct 31 06:16:08 UTC 2025: Dumping log of pods/dns-default-qs2bx current container kube-rbac-proxy in openshift-dns... INFO: Fri Oct 31 06:16:09 UTC 2025: Dumping log of pods/dns-default-wkz9f current container dns in openshift-dns... INFO: Fri Oct 31 06:16:09 UTC 2025: Dumping log of pods/dns-default-wkz9f current container kube-rbac-proxy in openshift-dns... INFO: Fri Oct 31 06:16:10 UTC 2025: Dumping log of pods/node-resolver-2kkpw current container dns-node-resolver in openshift-dns... INFO: Fri Oct 31 06:16:11 UTC 2025: Dumping log of pods/node-resolver-2zg7g current container dns-node-resolver in openshift-dns... INFO: Fri Oct 31 06:16:11 UTC 2025: Dumping log of pods/node-resolver-4khpf current container dns-node-resolver in openshift-dns... INFO: Fri Oct 31 06:16:12 UTC 2025: Dumping log of pods/node-resolver-ctldt current container dns-node-resolver in openshift-dns... INFO: Fri Oct 31 06:16:13 UTC 2025: Dumping log of pods/node-resolver-pdnsn current container dns-node-resolver in openshift-dns... INFO: Fri Oct 31 06:16:14 UTC 2025: Dumping log of pods/node-resolver-sh6p8 current container dns-node-resolver in openshift-dns... INFO: Fri Oct 31 06:16:14 UTC 2025: >>> Collecting secrets from namespace openshift-dns <<< NAME TYPE DATA AGE builder-dockercfg-mn5dk kubernetes.io/dockercfg 1 139m default-dockercfg-cg7v9 kubernetes.io/dockercfg 1 140m deployer-dockercfg-74sjc kubernetes.io/dockercfg 1 139m dns-default-metrics-tls kubernetes.io/tls 2 152m dns-dockercfg-p8lt7 kubernetes.io/dockercfg 1 140m node-resolver-dockercfg-kp4t8 kubernetes.io/dockercfg 1 140m INFO: Fri Oct 31 06:16:17 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-dns <<< NAME SECRETS AGE builder 1 140m default 1 152m deployer 1 140m dns 1 152m node-resolver 1 152m INFO: Fri Oct 31 06:16:20 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-dns <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 135m autoscaling.openshift.io 2 152m cluster-baremetal-validating-webhook-configuration 1 152m controlplanemachineset.machine.openshift.io 1 149m machine-api 2 152m monitoringconfigmaps.openshift.io 1 133m multus.openshift.io 1 154m network-node-identity.openshift.io 2 137m performance-addon-operator 1 159m prometheusrules.openshift.io 1 135m stackrox 2 108m INFO: Fri Oct 31 06:16:27 UTC 2025: >>> Collecting catalogsources from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Fri Oct 31 06:16:28 UTC 2025: >>> Collecting subscriptions from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Fri Oct 31 06:16:28 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-dns <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:16:29 UTC 2025: >>> Collecting central from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Fri Oct 31 06:16:29 UTC 2025: >>> Collecting securedclusters from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Fri Oct 31 06:16:29 UTC 2025: >>> Collecting nodes from namespace openshift-dns <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 157m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 136m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 157m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 157m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 136m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 136m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:16:35: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-apiserver', '/tmp/k8s-service-logs/part-2/k8s-logs'] NAME STATUS AGE openshift-apiserver Active 153m INFO: Fri Oct 31 06:16:35 UTC 2025: >>> Collecting from namespace openshift-apiserver <<< INFO: Fri Oct 31 06:16:35 UTC 2025: >>> Collecting daemonsets from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Fri Oct 31 06:16:35 UTC 2025: >>> Collecting deployments from namespace openshift-apiserver <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR apiserver 3/3 3 3 153m openshift-apiserver,openshift-apiserver-check-endpoints quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb38700fc135a88ace2ec6d0a0e6da09dcfe783b599dfaa086f8fbc08696c2a5,quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:33260e735d30c8f9e69e282c4f357529628caa01d865fdf2272cc7397a94270f apiserver=true,app=openshift-apiserver-a INFO: Fri Oct 31 06:16:36 UTC 2025: >>> Collecting services from namespace openshift-apiserver <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR api ClusterIP 172.30.246.179 443/TCP 153m apiserver=true check-endpoints ClusterIP 172.30.48.233 17698/TCP 153m apiserver=true INFO: Fri Oct 31 06:16:37 UTC 2025: >>> Collecting pods from namespace openshift-apiserver <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES apiserver-65db4b4787-24s6x 2/2 Running 0 130m 10.130.0.87 ip-10-0-40-239.ec2.internal apiserver-65db4b4787-66628 2/2 Running 0 128m 10.129.0.73 ip-10-0-52-51.ec2.internal apiserver-65db4b4787-dqbkk 2/2 Running 0 131m 10.128.0.66 ip-10-0-119-203.ec2.internal INFO: Fri Oct 31 06:16:38 UTC 2025: Dumping log of pods/apiserver-65db4b4787-24s6x current container openshift-apiserver in openshift-apiserver... INFO: Fri Oct 31 06:16:38 UTC 2025: Dumping log of pods/apiserver-65db4b4787-24s6x current container openshift-apiserver-check-endpoints in openshift-apiserver... INFO: Fri Oct 31 06:16:39 UTC 2025: Dumping log of pods/apiserver-65db4b4787-24s6x current container fix-audit-permissions in openshift-apiserver... INFO: Fri Oct 31 06:16:39 UTC 2025: Dumping log of pods/apiserver-65db4b4787-66628 current container openshift-apiserver in openshift-apiserver... INFO: Fri Oct 31 06:16:40 UTC 2025: Dumping log of pods/apiserver-65db4b4787-66628 current container openshift-apiserver-check-endpoints in openshift-apiserver... INFO: Fri Oct 31 06:16:40 UTC 2025: Dumping log of pods/apiserver-65db4b4787-66628 current container fix-audit-permissions in openshift-apiserver... INFO: Fri Oct 31 06:16:41 UTC 2025: Dumping log of pods/apiserver-65db4b4787-dqbkk current container openshift-apiserver in openshift-apiserver... INFO: Fri Oct 31 06:16:41 UTC 2025: Dumping log of pods/apiserver-65db4b4787-dqbkk current container openshift-apiserver-check-endpoints in openshift-apiserver... INFO: Fri Oct 31 06:16:41 UTC 2025: Dumping log of pods/apiserver-65db4b4787-dqbkk current container fix-audit-permissions in openshift-apiserver... INFO: Fri Oct 31 06:16:42 UTC 2025: >>> Collecting secrets from namespace openshift-apiserver <<< NAME TYPE DATA AGE builder-dockercfg-vhrn6 kubernetes.io/dockercfg 1 140m default-dockercfg-ghcts kubernetes.io/dockercfg 1 140m deployer-dockercfg-gptsd kubernetes.io/dockercfg 1 140m etcd-client kubernetes.io/tls 2 153m openshift-apiserver-sa-dockercfg-v8mlz kubernetes.io/dockercfg 1 140m serving-cert kubernetes.io/tls 2 153m INFO: Fri Oct 31 06:16:45 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-apiserver <<< NAME SECRETS AGE builder 1 140m default 1 153m deployer 1 140m openshift-apiserver-sa 1 153m INFO: Fri Oct 31 06:16:47 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-apiserver <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 135m autoscaling.openshift.io 2 153m cluster-baremetal-validating-webhook-configuration 1 153m controlplanemachineset.machine.openshift.io 1 150m machine-api 2 153m monitoringconfigmaps.openshift.io 1 134m multus.openshift.io 1 154m network-node-identity.openshift.io 2 138m performance-addon-operator 1 160m prometheusrules.openshift.io 1 135m stackrox 2 109m INFO: Fri Oct 31 06:16:55 UTC 2025: >>> Collecting catalogsources from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Fri Oct 31 06:16:55 UTC 2025: >>> Collecting subscriptions from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Fri Oct 31 06:16:55 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-apiserver <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:16:56 UTC 2025: >>> Collecting central from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Fri Oct 31 06:16:56 UTC 2025: >>> Collecting securedclusters from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Fri Oct 31 06:16:56 UTC 2025: >>> Collecting nodes from namespace openshift-apiserver <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 157m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 137m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 157m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 157m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 137m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 137m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:17:02: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-authentication', '/tmp/k8s-service-logs/part-2/k8s-logs'] NAME STATUS AGE openshift-authentication Active 153m INFO: Fri Oct 31 06:17:03 UTC 2025: >>> Collecting from namespace openshift-authentication <<< INFO: Fri Oct 31 06:17:03 UTC 2025: >>> Collecting daemonsets from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Fri Oct 31 06:17:03 UTC 2025: >>> Collecting deployments from namespace openshift-authentication <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR oauth-openshift 3/3 3 3 136m oauth-openshift quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bc5ea206be1759578ed058c6ab20025614dcb70cbeace99acfb72b349170468e app=oauth-openshift INFO: Fri Oct 31 06:17:04 UTC 2025: >>> Collecting services from namespace openshift-authentication <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR oauth-openshift ClusterIP 172.30.89.84 443/TCP 153m app=oauth-openshift INFO: Fri Oct 31 06:17:04 UTC 2025: >>> Collecting pods from namespace openshift-authentication <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES oauth-openshift-86f58ccd9-2mr7g 1/1 Running 0 136m 10.129.0.62 ip-10-0-52-51.ec2.internal oauth-openshift-86f58ccd9-cm656 1/1 Running 0 136m 10.128.0.56 ip-10-0-119-203.ec2.internal oauth-openshift-86f58ccd9-rfb7j 1/1 Running 0 136m 10.130.0.76 ip-10-0-40-239.ec2.internal INFO: Fri Oct 31 06:17:05 UTC 2025: Dumping log of pods/oauth-openshift-86f58ccd9-2mr7g current container oauth-openshift in openshift-authentication... INFO: Fri Oct 31 06:17:06 UTC 2025: Dumping log of pods/oauth-openshift-86f58ccd9-cm656 current container oauth-openshift in openshift-authentication... INFO: Fri Oct 31 06:17:07 UTC 2025: Dumping log of pods/oauth-openshift-86f58ccd9-rfb7j current container oauth-openshift in openshift-authentication... INFO: Fri Oct 31 06:17:07 UTC 2025: >>> Collecting secrets from namespace openshift-authentication <<< NAME TYPE DATA AGE builder-dockercfg-v8zqj kubernetes.io/dockercfg 1 140m default-dockercfg-vxdd4 kubernetes.io/dockercfg 1 140m deployer-dockercfg-dznrg kubernetes.io/dockercfg 1 140m oauth-openshift-dockercfg-7vr7j kubernetes.io/dockercfg 1 140m v4-0-config-system-ocp-branding-template Opaque 3 153m v4-0-config-system-router-certs Opaque 1 153m v4-0-config-system-serving-cert kubernetes.io/tls 2 153m v4-0-config-system-session Opaque 1 138m INFO: Fri Oct 31 06:17:12 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-authentication <<< NAME SECRETS AGE builder 1 140m default 1 153m deployer 1 140m oauth-openshift 1 153m INFO: Fri Oct 31 06:17:15 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-authentication <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 136m autoscaling.openshift.io 2 153m cluster-baremetal-validating-webhook-configuration 1 153m controlplanemachineset.machine.openshift.io 1 150m machine-api 2 153m monitoringconfigmaps.openshift.io 1 134m multus.openshift.io 1 155m network-node-identity.openshift.io 2 138m performance-addon-operator 1 160m prometheusrules.openshift.io 1 136m stackrox 2 109m INFO: Fri Oct 31 06:17:22 UTC 2025: >>> Collecting catalogsources from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Fri Oct 31 06:17:22 UTC 2025: >>> Collecting subscriptions from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Fri Oct 31 06:17:22 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-authentication <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:17:23 UTC 2025: >>> Collecting central from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Fri Oct 31 06:17:23 UTC 2025: >>> Collecting securedclusters from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Fri Oct 31 06:17:24 UTC 2025: >>> Collecting nodes from namespace openshift-authentication <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 158m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 137m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 158m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 158m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 137m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 137m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:17:29: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-etcd', '/tmp/k8s-service-logs/part-2/k8s-logs'] NAME STATUS AGE openshift-etcd Active 162m INFO: Fri Oct 31 06:17:30 UTC 2025: >>> Collecting from namespace openshift-etcd <<< INFO: Fri Oct 31 06:17:30 UTC 2025: >>> Collecting daemonsets from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Fri Oct 31 06:17:30 UTC 2025: >>> Collecting deployments from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Fri Oct 31 06:17:30 UTC 2025: >>> Collecting services from namespace openshift-etcd <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR etcd ClusterIP 172.30.48.236 2379/TCP,2380/TCP,9978/TCP,9979/TCP,9980/TCP 161m etcd=true INFO: Fri Oct 31 06:17:31 UTC 2025: >>> Collecting pods from namespace openshift-etcd <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES etcd-guard-ip-10-0-119-203.ec2.internal 1/1 Running 0 153m 10.128.0.27 ip-10-0-119-203.ec2.internal etcd-guard-ip-10-0-40-239.ec2.internal 1/1 Running 0 143m 10.130.0.58 ip-10-0-40-239.ec2.internal etcd-guard-ip-10-0-52-51.ec2.internal 1/1 Running 0 140m 10.129.0.44 ip-10-0-52-51.ec2.internal etcd-ip-10-0-119-203.ec2.internal 5/5 Running 0 130m 10.0.119.203 ip-10-0-119-203.ec2.internal etcd-ip-10-0-40-239.ec2.internal 5/5 Running 0 128m 10.0.40.239 ip-10-0-40-239.ec2.internal etcd-ip-10-0-52-51.ec2.internal 5/5 Running 0 125m 10.0.52.51 ip-10-0-52-51.ec2.internal installer-5-ip-10-0-40-239.ec2.internal 0/1 Completed 0 143m 10.130.0.60 ip-10-0-40-239.ec2.internal installer-5-ip-10-0-52-51.ec2.internal 0/1 Completed 0 140m 10.129.0.40 ip-10-0-52-51.ec2.internal installer-7-ip-10-0-119-203.ec2.internal 0/1 Completed 0 137m 10.128.0.52 ip-10-0-119-203.ec2.internal installer-7-ip-10-0-40-239.ec2.internal 0/1 Completed 0 134m 10.130.0.79 ip-10-0-40-239.ec2.internal installer-7-ip-10-0-52-51.ec2.internal 0/1 Completed 0 139m 10.129.0.47 ip-10-0-52-51.ec2.internal installer-8-ip-10-0-119-203.ec2.internal 0/1 Completed 0 131m 10.128.0.64 ip-10-0-119-203.ec2.internal installer-8-ip-10-0-40-239.ec2.internal 0/1 Completed 0 129m 10.130.0.86 ip-10-0-40-239.ec2.internal installer-8-ip-10-0-52-51.ec2.internal 0/1 Completed 0 127m 10.129.0.74 ip-10-0-52-51.ec2.internal revision-pruner-7-ip-10-0-119-203.ec2.internal 0/1 Completed 0 132m 10.128.0.62 ip-10-0-119-203.ec2.internal revision-pruner-7-ip-10-0-40-239.ec2.internal 0/1 Completed 0 132m 10.130.0.83 ip-10-0-40-239.ec2.internal revision-pruner-7-ip-10-0-52-51.ec2.internal 0/1 Completed 0 132m 10.129.0.66 ip-10-0-52-51.ec2.internal revision-pruner-8-ip-10-0-119-203.ec2.internal 0/1 Completed 0 132m 10.128.0.63 ip-10-0-119-203.ec2.internal revision-pruner-8-ip-10-0-40-239.ec2.internal 0/1 Completed 0 132m 10.130.0.84 ip-10-0-40-239.ec2.internal revision-pruner-8-ip-10-0-52-51.ec2.internal 0/1 Completed 0 131m 10.129.0.67 ip-10-0-52-51.ec2.internal INFO: Fri Oct 31 06:17:31 UTC 2025: Dumping log of pods/etcd-guard-ip-10-0-119-203.ec2.internal current container guard in openshift-etcd... INFO: Fri Oct 31 06:17:32 UTC 2025: Dumping log of pods/etcd-guard-ip-10-0-40-239.ec2.internal current container guard in openshift-etcd... INFO: Fri Oct 31 06:17:33 UTC 2025: Dumping log of pods/etcd-guard-ip-10-0-52-51.ec2.internal current container guard in openshift-etcd... INFO: Fri Oct 31 06:17:34 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcd in openshift-etcd... INFO: Fri Oct 31 06:17:34 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcd-metrics in openshift-etcd... INFO: Fri Oct 31 06:17:34 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcd-readyz in openshift-etcd... INFO: Fri Oct 31 06:17:35 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcd-rev in openshift-etcd... INFO: Fri Oct 31 06:17:35 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcdctl in openshift-etcd... INFO: Fri Oct 31 06:17:35 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container setup in openshift-etcd... INFO: Fri Oct 31 06:17:36 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcd-ensure-env-vars in openshift-etcd... INFO: Fri Oct 31 06:17:36 UTC 2025: Dumping log of pods/etcd-ip-10-0-119-203.ec2.internal current container etcd-resources-copy in openshift-etcd... INFO: Fri Oct 31 06:17:37 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcd in openshift-etcd... INFO: Fri Oct 31 06:17:37 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcd-metrics in openshift-etcd... INFO: Fri Oct 31 06:17:37 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcd-readyz in openshift-etcd... INFO: Fri Oct 31 06:17:37 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcd-rev in openshift-etcd... INFO: Fri Oct 31 06:17:38 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcdctl in openshift-etcd... INFO: Fri Oct 31 06:17:38 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container setup in openshift-etcd... INFO: Fri Oct 31 06:17:38 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcd-ensure-env-vars in openshift-etcd... INFO: Fri Oct 31 06:17:39 UTC 2025: Dumping log of pods/etcd-ip-10-0-40-239.ec2.internal current container etcd-resources-copy in openshift-etcd... INFO: Fri Oct 31 06:17:40 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcd in openshift-etcd... INFO: Fri Oct 31 06:17:40 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcd-metrics in openshift-etcd... INFO: Fri Oct 31 06:17:40 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcd-readyz in openshift-etcd... INFO: Fri Oct 31 06:17:40 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcd-rev in openshift-etcd... INFO: Fri Oct 31 06:17:41 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcdctl in openshift-etcd... INFO: Fri Oct 31 06:17:41 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container setup in openshift-etcd... INFO: Fri Oct 31 06:17:41 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcd-ensure-env-vars in openshift-etcd... INFO: Fri Oct 31 06:17:42 UTC 2025: Dumping log of pods/etcd-ip-10-0-52-51.ec2.internal current container etcd-resources-copy in openshift-etcd... INFO: Fri Oct 31 06:17:42 UTC 2025: Dumping log of pods/installer-5-ip-10-0-40-239.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:17:43 UTC 2025: Dumping log of pods/installer-5-ip-10-0-52-51.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:17:44 UTC 2025: Dumping log of pods/installer-7-ip-10-0-119-203.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:17:45 UTC 2025: Dumping log of pods/installer-7-ip-10-0-40-239.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:17:45 UTC 2025: Dumping log of pods/installer-7-ip-10-0-52-51.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:17:46 UTC 2025: Dumping log of pods/installer-8-ip-10-0-119-203.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:17:47 UTC 2025: Dumping log of pods/installer-8-ip-10-0-40-239.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:17:48 UTC 2025: Dumping log of pods/installer-8-ip-10-0-52-51.ec2.internal current container installer in openshift-etcd... INFO: Fri Oct 31 06:17:49 UTC 2025: Dumping log of pods/revision-pruner-7-ip-10-0-119-203.ec2.internal current container pruner in openshift-etcd... INFO: Fri Oct 31 06:17:49 UTC 2025: Dumping log of pods/revision-pruner-7-ip-10-0-40-239.ec2.internal current container pruner in openshift-etcd... INFO: Fri Oct 31 06:17:50 UTC 2025: Dumping log of pods/revision-pruner-7-ip-10-0-52-51.ec2.internal current container pruner in openshift-etcd... INFO: Fri Oct 31 06:17:51 UTC 2025: Dumping log of pods/revision-pruner-8-ip-10-0-119-203.ec2.internal current container pruner in openshift-etcd... INFO: Fri Oct 31 06:17:52 UTC 2025: Dumping log of pods/revision-pruner-8-ip-10-0-40-239.ec2.internal current container pruner in openshift-etcd... INFO: Fri Oct 31 06:17:52 UTC 2025: Dumping log of pods/revision-pruner-8-ip-10-0-52-51.ec2.internal current container pruner in openshift-etcd... INFO: Fri Oct 31 06:17:53 UTC 2025: >>> Collecting secrets from namespace openshift-etcd <<< NAME TYPE DATA AGE builder-dockercfg-jlctz kubernetes.io/dockercfg 1 141m default-dockercfg-p8x5v kubernetes.io/dockercfg 1 141m deployer-dockercfg-lxvxc kubernetes.io/dockercfg 1 141m etcd-all-certs Opaque 18 162m etcd-all-certs-4 Opaque 18 143m etcd-all-certs-5 Opaque 18 143m etcd-all-certs-6 Opaque 18 140m etcd-all-certs-7 Opaque 18 139m etcd-all-certs-8 Opaque 18 132m etcd-backup-sa-dockercfg-5rhbv kubernetes.io/dockercfg 1 141m etcd-client kubernetes.io/tls 2 162m etcd-metric-client kubernetes.io/tls 2 162m etcd-metric-signer kubernetes.io/tls 2 162m etcd-peer-ip-10-0-119-203.ec2.internal kubernetes.io/tls 2 154m etcd-peer-ip-10-0-145-168 kubernetes.io/tls 2 162m etcd-peer-ip-10-0-40-239.ec2.internal kubernetes.io/tls 2 154m etcd-peer-ip-10-0-52-51.ec2.internal kubernetes.io/tls 2 154m etcd-sa-dockercfg-gfmkj kubernetes.io/dockercfg 1 141m etcd-serving-ip-10-0-119-203.ec2.internal kubernetes.io/tls 2 154m etcd-serving-ip-10-0-145-168 kubernetes.io/tls 2 162m etcd-serving-ip-10-0-40-239.ec2.internal kubernetes.io/tls 2 154m etcd-serving-ip-10-0-52-51.ec2.internal kubernetes.io/tls 2 154m etcd-serving-metrics-ip-10-0-119-203.ec2.internal kubernetes.io/tls 2 154m etcd-serving-metrics-ip-10-0-145-168 kubernetes.io/tls 2 162m etcd-serving-metrics-ip-10-0-40-239.ec2.internal kubernetes.io/tls 2 154m etcd-serving-metrics-ip-10-0-52-51.ec2.internal kubernetes.io/tls 2 154m etcd-signer kubernetes.io/tls 2 162m installer-sa-dockercfg-hrqr5 kubernetes.io/dockercfg 1 141m serving-cert kubernetes.io/tls 2 154m INFO: Fri Oct 31 06:18:09 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-etcd <<< NAME SECRETS AGE builder 1 141m default 1 162m deployer 1 141m etcd-backup-sa 1 154m etcd-sa 1 154m installer-sa 1 155m INFO: Fri Oct 31 06:18:12 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-etcd <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 137m autoscaling.openshift.io 2 154m cluster-baremetal-validating-webhook-configuration 1 154m controlplanemachineset.machine.openshift.io 1 151m machine-api 2 154m monitoringconfigmaps.openshift.io 1 135m multus.openshift.io 1 156m network-node-identity.openshift.io 2 139m performance-addon-operator 1 161m prometheusrules.openshift.io 1 137m stackrox 2 110m INFO: Fri Oct 31 06:18:20 UTC 2025: >>> Collecting catalogsources from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Fri Oct 31 06:18:20 UTC 2025: >>> Collecting subscriptions from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Fri Oct 31 06:18:20 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-etcd <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:18:21 UTC 2025: >>> Collecting central from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Fri Oct 31 06:18:21 UTC 2025: >>> Collecting securedclusters from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Fri Oct 31 06:18:21 UTC 2025: >>> Collecting nodes from namespace openshift-etcd <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 159m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 138m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 159m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 159m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 138m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 138m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:18:27: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-controller-manager', '/tmp/k8s-service-logs/part-2/k8s-logs'] NAME STATUS AGE openshift-controller-manager Active 155m INFO: Fri Oct 31 06:18:27 UTC 2025: >>> Collecting from namespace openshift-controller-manager <<< INFO: Fri Oct 31 06:18:27 UTC 2025: >>> Collecting daemonsets from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Fri Oct 31 06:18:28 UTC 2025: >>> Collecting deployments from namespace openshift-controller-manager <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR controller-manager 3/3 3 3 155m controller-manager quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:326b073a9fbf63167f0760436bd8be4e8496ca5f69b5c11409f5c85fd7a2c734 app=openshift-controller-manager-a,controller-manager=true INFO: Fri Oct 31 06:18:28 UTC 2025: >>> Collecting services from namespace openshift-controller-manager <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR controller-manager ClusterIP 172.30.53.85 443/TCP 155m controller-manager=true INFO: Fri Oct 31 06:18:29 UTC 2025: >>> Collecting pods from namespace openshift-controller-manager <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES controller-manager-5d7d85d87d-7cs4c 1/1 Running 0 139m 10.128.0.50 ip-10-0-119-203.ec2.internal controller-manager-5d7d85d87d-b8b4t 1/1 Running 0 139m 10.130.0.70 ip-10-0-40-239.ec2.internal controller-manager-5d7d85d87d-c44qj 1/1 Running 0 139m 10.129.0.51 ip-10-0-52-51.ec2.internal INFO: Fri Oct 31 06:18:30 UTC 2025: Dumping log of pods/controller-manager-5d7d85d87d-7cs4c current container controller-manager in openshift-controller-manager... INFO: Fri Oct 31 06:18:31 UTC 2025: Dumping log of pods/controller-manager-5d7d85d87d-b8b4t current container controller-manager in openshift-controller-manager... INFO: Fri Oct 31 06:18:32 UTC 2025: Dumping log of pods/controller-manager-5d7d85d87d-c44qj current container controller-manager in openshift-controller-manager... INFO: Fri Oct 31 06:18:32 UTC 2025: >>> Collecting secrets from namespace openshift-controller-manager <<< NAME TYPE DATA AGE builder-dockercfg-ddf6h kubernetes.io/dockercfg 1 142m default-dockercfg-v29nc kubernetes.io/dockercfg 1 142m deployer-dockercfg-sd6hg kubernetes.io/dockercfg 1 142m openshift-controller-manager-sa-dockercfg-s528s kubernetes.io/dockercfg 1 142m serving-cert kubernetes.io/tls 2 155m INFO: Fri Oct 31 06:18:35 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-controller-manager <<< NAME SECRETS AGE builder 1 142m default 1 155m deployer 1 142m openshift-controller-manager-sa 1 155m INFO: Fri Oct 31 06:18:37 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-controller-manager <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 137m autoscaling.openshift.io 2 154m cluster-baremetal-validating-webhook-configuration 1 154m controlplanemachineset.machine.openshift.io 1 152m machine-api 2 154m monitoringconfigmaps.openshift.io 1 135m multus.openshift.io 1 156m network-node-identity.openshift.io 2 139m performance-addon-operator 1 162m prometheusrules.openshift.io 1 137m stackrox 2 111m INFO: Fri Oct 31 06:18:44 UTC 2025: >>> Collecting catalogsources from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Fri Oct 31 06:18:45 UTC 2025: >>> Collecting subscriptions from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Fri Oct 31 06:18:45 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-controller-manager <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:18:46 UTC 2025: >>> Collecting central from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Fri Oct 31 06:18:46 UTC 2025: >>> Collecting securedclusters from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Fri Oct 31 06:18:46 UTC 2025: >>> Collecting nodes from namespace openshift-controller-manager <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 159m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 138m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 159m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 159m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 138m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 138m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:18:52: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-compliance', '/tmp/k8s-service-logs/part-2/k8s-logs'] Error from server (NotFound): namespaces "openshift-compliance" not found INFO: Fri Oct 31 06:18:52 UTC 2025: Skipping missing namespace openshift-compliance 06:18:52: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-ingress', '/tmp/k8s-service-logs/part-2/k8s-logs'] NAME STATUS AGE openshift-ingress Active 155m INFO: Fri Oct 31 06:18:52 UTC 2025: >>> Collecting from namespace openshift-ingress <<< INFO: Fri Oct 31 06:18:52 UTC 2025: >>> Collecting daemonsets from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Fri Oct 31 06:18:53 UTC 2025: >>> Collecting deployments from namespace openshift-ingress <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR router-default 2/2 2 2 155m router quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:086b4263895663cbc94544e41ac197ee96ba661379a498733e1f65f5ce53f1c8 ingresscontroller.operator.openshift.io/deployment-ingresscontroller=default INFO: Fri Oct 31 06:18:54 UTC 2025: >>> Collecting services from namespace openshift-ingress <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR router-default LoadBalancer 172.30.83.245 aa9ecdbe78ba64e70a440bb4f83dace4-1114485601.XXXXXXXXX.elb.amazonaws.com 80:31948/TCP,443:31508/TCP 155m ingresscontroller.operator.openshift.io/deployment-ingresscontroller=default router-internal-default ClusterIP 172.30.34.155 80/TCP,443/TCP,1936/TCP 155m ingresscontroller.operator.openshift.io/deployment-ingresscontroller=default INFO: Fri Oct 31 06:18:55 UTC 2025: >>> Collecting pods from namespace openshift-ingress <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES router-default-5c65bb8759-k9k7w 1/1 Running 0 155m 10.129.2.10 ip-10-0-28-116.ec2.internal router-default-5c65bb8759-z9czs 1/1 Running 0 155m 10.131.0.6 ip-10-0-72-187.ec2.internal INFO: Fri Oct 31 06:18:55 UTC 2025: Dumping log of pods/router-default-5c65bb8759-k9k7w current container router in openshift-ingress... INFO: Fri Oct 31 06:18:56 UTC 2025: Dumping log of pods/router-default-5c65bb8759-z9czs current container router in openshift-ingress... INFO: Fri Oct 31 06:18:57 UTC 2025: >>> Collecting secrets from namespace openshift-ingress <<< NAME TYPE DATA AGE builder-dockercfg-6kd7x kubernetes.io/dockercfg 1 142m default-dockercfg-nqzj6 kubernetes.io/dockercfg 1 142m deployer-dockercfg-fwwnj kubernetes.io/dockercfg 1 142m router-certs-default kubernetes.io/tls 2 155m router-dockercfg-znssc kubernetes.io/dockercfg 1 142m router-metrics-certs-default kubernetes.io/tls 2 155m router-stats-default Opaque 2 155m INFO: Fri Oct 31 06:19:01 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-ingress <<< NAME SECRETS AGE builder 1 142m default 1 155m deployer 1 142m router 1 155m INFO: Fri Oct 31 06:19:03 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-ingress <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 138m autoscaling.openshift.io 2 155m cluster-baremetal-validating-webhook-configuration 1 155m controlplanemachineset.machine.openshift.io 1 152m machine-api 2 155m monitoringconfigmaps.openshift.io 1 136m multus.openshift.io 1 156m network-node-identity.openshift.io 2 140m performance-addon-operator 1 162m prometheusrules.openshift.io 1 138m stackrox 2 111m INFO: Fri Oct 31 06:19:10 UTC 2025: >>> Collecting catalogsources from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Fri Oct 31 06:19:10 UTC 2025: >>> Collecting subscriptions from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Fri Oct 31 06:19:11 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-ingress <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:19:12 UTC 2025: >>> Collecting central from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Fri Oct 31 06:19:12 UTC 2025: >>> Collecting securedclusters from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Fri Oct 31 06:19:12 UTC 2025: >>> Collecting nodes from namespace openshift-ingress <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 159m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 139m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 159m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 159m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 139m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 139m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:19:18: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-marketplace', '/tmp/k8s-service-logs/part-2/k8s-logs'] NAME STATUS AGE openshift-marketplace Active 163m INFO: Fri Oct 31 06:19:18 UTC 2025: >>> Collecting from namespace openshift-marketplace <<< INFO: Fri Oct 31 06:19:18 UTC 2025: >>> Collecting daemonsets from namespace openshift-marketplace <<< No resources found in openshift-marketplace namespace. INFO: Fri Oct 31 06:19:18 UTC 2025: >>> Collecting deployments from namespace openshift-marketplace <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR marketplace-operator 1/1 1 1 162m marketplace-operator quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:99ebaeb9609d1e163c4d312d51f7bad7d38acff5f38c508a0d8c5d21317d5ed2 name=marketplace-operator INFO: Fri Oct 31 06:19:19 UTC 2025: >>> Collecting services from namespace openshift-marketplace <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR certified-operators ClusterIP 172.30.141.22 50051/TCP 155m olm.catalogSource=certified-operators,olm.managed=true community-operators ClusterIP 172.30.236.232 50051/TCP 155m olm.catalogSource=community-operators,olm.managed=true marketplace-operator-metrics ClusterIP 172.30.25.165 8383/TCP,8081/TCP 163m name=marketplace-operator redhat-marketplace ClusterIP 172.30.171.202 50051/TCP 155m olm.catalogSource=redhat-marketplace,olm.managed=true redhat-operators ClusterIP 172.30.101.216 50051/TCP 155m olm.catalogSource=redhat-operators,olm.managed=true INFO: Fri Oct 31 06:19:22 UTC 2025: >>> Collecting pods from namespace openshift-marketplace <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES certified-operators-p4cqh 1/1 Running 0 143m 10.129.0.36 ip-10-0-52-51.ec2.internal community-operators-bfkhb 1/1 Running 0 20m 10.129.0.118 ip-10-0-52-51.ec2.internal marketplace-operator-59f9fd9b7-hhzg9 1/1 Running 1 (150m ago) 157m 10.130.0.27 ip-10-0-40-239.ec2.internal redhat-marketplace-b9zcc 1/1 Running 0 143m 10.129.0.38 ip-10-0-52-51.ec2.internal redhat-operators-j85mj 1/1 Running 0 143m 10.129.0.39 ip-10-0-52-51.ec2.internal INFO: Fri Oct 31 06:19:23 UTC 2025: Dumping log of pods/certified-operators-p4cqh current container registry-server in openshift-marketplace... INFO: Fri Oct 31 06:19:24 UTC 2025: Dumping log of pods/certified-operators-p4cqh current container extract-utilities in openshift-marketplace... INFO: Fri Oct 31 06:19:24 UTC 2025: Dumping log of pods/certified-operators-p4cqh current container extract-content in openshift-marketplace... INFO: Fri Oct 31 06:19:25 UTC 2025: Dumping log of pods/community-operators-bfkhb current container registry-server in openshift-marketplace... INFO: Fri Oct 31 06:19:25 UTC 2025: Dumping log of pods/community-operators-bfkhb current container extract-utilities in openshift-marketplace... INFO: Fri Oct 31 06:19:26 UTC 2025: Dumping log of pods/community-operators-bfkhb current container extract-content in openshift-marketplace... INFO: Fri Oct 31 06:19:26 UTC 2025: Dumping log of pods/marketplace-operator-59f9fd9b7-hhzg9 current container marketplace-operator in openshift-marketplace... INFO: Fri Oct 31 06:19:27 UTC 2025: Dumping log of pods/marketplace-operator-59f9fd9b7-hhzg9 previous container marketplace-operator in openshift-marketplace... INFO: Fri Oct 31 06:19:27 UTC 2025: Dumping log of pods/redhat-marketplace-b9zcc current container registry-server in openshift-marketplace... INFO: Fri Oct 31 06:19:28 UTC 2025: Dumping log of pods/redhat-marketplace-b9zcc current container extract-utilities in openshift-marketplace... INFO: Fri Oct 31 06:19:28 UTC 2025: Dumping log of pods/redhat-marketplace-b9zcc current container extract-content in openshift-marketplace... INFO: Fri Oct 31 06:19:29 UTC 2025: Dumping log of pods/redhat-operators-j85mj current container registry-server in openshift-marketplace... INFO: Fri Oct 31 06:19:31 UTC 2025: Dumping log of pods/redhat-operators-j85mj current container extract-utilities in openshift-marketplace... INFO: Fri Oct 31 06:19:31 UTC 2025: Dumping log of pods/redhat-operators-j85mj current container extract-content in openshift-marketplace... INFO: Fri Oct 31 06:19:31 UTC 2025: >>> Collecting secrets from namespace openshift-marketplace <<< NAME TYPE DATA AGE builder-dockercfg-clrc9 kubernetes.io/dockercfg 1 143m certified-operators-dockercfg-8dqpl kubernetes.io/dockercfg 1 143m community-operators-dockercfg-wgjfb kubernetes.io/dockercfg 1 143m default-dockercfg-9hdtx kubernetes.io/dockercfg 1 143m deployer-dockercfg-gxd6l kubernetes.io/dockercfg 1 143m marketplace-operator-dockercfg-gjpf6 kubernetes.io/dockercfg 1 143m marketplace-operator-metrics kubernetes.io/tls 2 156m redhat-marketplace-dockercfg-jg892 kubernetes.io/dockercfg 1 143m redhat-operators-dockercfg-fjnhf kubernetes.io/dockercfg 1 143m INFO: Fri Oct 31 06:19:36 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-marketplace <<< NAME SECRETS AGE builder 1 143m certified-operators 1 155m community-operators 1 155m default 1 163m deployer 1 143m marketplace-operator 1 163m redhat-marketplace 1 155m redhat-operators 1 155m INFO: Fri Oct 31 06:19:41 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-marketplace <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 138m autoscaling.openshift.io 2 156m cluster-baremetal-validating-webhook-configuration 1 156m controlplanemachineset.machine.openshift.io 1 153m machine-api 2 156m monitoringconfigmaps.openshift.io 1 136m multus.openshift.io 1 157m network-node-identity.openshift.io 2 140m performance-addon-operator 1 163m prometheusrules.openshift.io 1 138m stackrox 2 112m INFO: Fri Oct 31 06:19:48 UTC 2025: >>> Collecting catalogsources from namespace openshift-marketplace <<< NAME DISPLAY TYPE PUBLISHER AGE certified-operators Certified Operators grpc Red Hat 155m community-operators Community Operators grpc Red Hat 155m redhat-marketplace Red Hat Marketplace grpc Red Hat 155m redhat-operators Red Hat Operators grpc Red Hat 155m INFO: Fri Oct 31 06:19:50 UTC 2025: >>> Collecting subscriptions from namespace openshift-marketplace <<< No resources found in openshift-marketplace namespace. INFO: Fri Oct 31 06:19:51 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-marketplace <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:19:52 UTC 2025: >>> Collecting central from namespace openshift-marketplace <<< No resources found in openshift-marketplace namespace. INFO: Fri Oct 31 06:19:52 UTC 2025: >>> Collecting securedclusters from namespace openshift-marketplace <<< No resources found in openshift-marketplace namespace. INFO: Fri Oct 31 06:19:52 UTC 2025: >>> Collecting nodes from namespace openshift-marketplace <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 160m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 139m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 160m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 160m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 139m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 139m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:19:58: Running post command: ['scripts/ci/collect-infrastructure-logs.sh', '/tmp/k8s-service-logs/part-2/k8s-logs'] Fri Oct 31 06:19:58 UTC 2025 Attempting to collect kube API server audit logs Client Version: 4.11.0-0.okd-2022-12-02-145640 Kustomize Version: v4.5.4 Server Version: 4.21.0-0.nightly-2025-10-30-125804 Kubernetes Version: v1.34.1 [must-gather ] OUT Using must-gather plug-in image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db9c9606365c344966d73b2bf801fc7b47819160e8ec76d8d25ce5cd113f90dc When opening a support case, bugzilla, or issue please include the following summary data along with any other requested information: ClusterID: 32d6e132-796d-480d-8c64-00017697401b ClusterVersion: Stable at "4.21.0-0.nightly-2025-10-30-125804" ClusterOperators: All healthy and stable [must-gather ] OUT namespace/openshift-must-gather-qvlbw created [must-gather ] OUT clusterrolebinding.rbac.authorization.k8s.io/must-gather-5ttcn created Warning: spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead [must-gather ] OUT pod for plug-in image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:db9c9606365c344966d73b2bf801fc7b47819160e8ec76d8d25ce5cd113f90dc created [must-gather-s5dtj] POD 2025-10-31T06:19:59.923330923Z WARNING: Collecting one or more audit logs on ALL masters in your cluster. This could take a large amount of time. [must-gather-s5dtj] POD 2025-10-31T06:20:00.040000612Z INFO: Started downloading openshift-apiserver/audit.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.040487302Z INFO: Started downloading openshift-apiserver/audit.log from ip-10-0-40-239.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.041586025Z INFO: Started downloading openshift-apiserver/audit.log from ip-10-0-52-51.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.200557818Z INFO: Started downloading kube-apiserver/audit-2025-10-31T04-43-08.865.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.200967357Z INFO: Started downloading kube-apiserver/audit-2025-10-31T05-59-26.946.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.201582090Z INFO: Started downloading kube-apiserver/audit.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.202854576Z INFO: Started downloading kube-apiserver/termination.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.210198780Z INFO: Started downloading kube-apiserver/audit-2025-10-31T05-14-54.994.log from ip-10-0-40-239.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.215279436Z INFO: Started downloading kube-apiserver/audit.log from ip-10-0-40-239.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.215682114Z INFO: Started downloading kube-apiserver/termination.log from ip-10-0-40-239.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.218195707Z INFO: Started downloading kube-apiserver/audit-2025-10-31T06-04-20.157.log from ip-10-0-52-51.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.221933505Z INFO: Started downloading kube-apiserver/audit.log from ip-10-0-52-51.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.236693584Z INFO: Started downloading kube-apiserver/termination.log from ip-10-0-52-51.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.301179741Z INFO: Finished downloading openshift-apiserver/audit.log from ip-10-0-52-51.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.304650164Z INFO: Finished downloading openshift-apiserver/audit.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.319632447Z INFO: Finished downloading openshift-apiserver/audit.log from ip-10-0-40-239.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.539814169Z INFO: Finished downloading kube-apiserver/termination.log from ip-10-0-40-239.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.557864306Z INFO: Finished downloading kube-apiserver/termination.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.671570953Z INFO: Started downloading oauth-apiserver/audit.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.679172582Z INFO: Started downloading oauth-apiserver/audit.log from ip-10-0-40-239.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.696025134Z INFO: Started downloading oauth-apiserver/audit.log from ip-10-0-52-51.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:00.721498747Z INFO: Finished downloading kube-apiserver/termination.log from ip-10-0-52-51.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:01.198279992Z INFO: Finished downloading oauth-apiserver/audit.log from ip-10-0-52-51.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:01.334458109Z INFO: Finished downloading oauth-apiserver/audit.log from ip-10-0-40-239.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:01.396802582Z INFO: Finished downloading oauth-apiserver/audit.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:01.647326918Z INFO: Finished downloading kube-apiserver/audit.log from ip-10-0-52-51.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:01.656791446Z INFO: Started downloading oauth-server/audit.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:01.668401179Z INFO: Started downloading oauth-server/audit.log from ip-10-0-40-239.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:01.671542884Z INFO: Started downloading oauth-server/audit.log from ip-10-0-52-51.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:01.997473407Z INFO: Finished downloading oauth-server/audit.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:02.000516911Z INFO: Finished downloading oauth-server/audit.log from ip-10-0-40-239.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:02.054270134Z INFO: Finished downloading kube-apiserver/audit.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:02.078600563Z INFO: Finished downloading oauth-server/audit.log from ip-10-0-52-51.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:04.307233655Z INFO: Finished downloading kube-apiserver/audit.log from ip-10-0-40-239.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:04.840217416Z INFO: Finished downloading kube-apiserver/audit-2025-10-31T06-04-20.157.log from ip-10-0-52-51.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:04.966282001Z INFO: Finished downloading kube-apiserver/audit-2025-10-31T05-59-26.946.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:04.971801686Z INFO: Finished downloading kube-apiserver/audit-2025-10-31T04-43-08.865.log from ip-10-0-119-203.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:05.039121563Z INFO: Finished downloading kube-apiserver/audit-2025-10-31T05-14-54.994.log from ip-10-0-40-239.ec2.internal [must-gather-s5dtj] POD 2025-10-31T06:20:05.217258857Z Collecting logs from metrics server pod: metrics-server-5db665f975-57n6s [must-gather-s5dtj] POD 2025-10-31T06:20:05.370563821Z Collecting logs from metrics server pod: metrics-server-5db665f975-g9kcp [must-gather-s5dtj] POD 2025-10-31T06:20:05.517600064Z INFO: Audit logs collected. [must-gather-s5dtj] OUT waiting for gather to complete [must-gather-s5dtj] OUT downloading gather output WARNING: rsync command not found in path. Please use your package manager to install it. [must-gather-s5dtj] OUT ./audit_logs/openshift-apiserver/ip-10-0-119-203.ec2.internal-audit.log.gz [must-gather-s5dtj] OUT ./audit_logs/openshift-apiserver/ip-10-0-40-239.ec2.internal-audit.log.gz [must-gather-s5dtj] OUT ./audit_logs/openshift-apiserver/ip-10-0-52-51.ec2.internal-audit.log.gz [must-gather-s5dtj] OUT ./audit_logs/openshift-apiserver.audit_logs_listing [must-gather-s5dtj] OUT ./audit_logs/kube-apiserver/ip-10-0-119-203.ec2.internal-audit-2025-10-31T04-43-08.865.log.gz [must-gather-s5dtj] OUT ./audit_logs/kube-apiserver/ip-10-0-119-203.ec2.internal-audit-2025-10-31T05-59-26.946.log.gz [must-gather-s5dtj] OUT ./audit_logs/kube-apiserver/ip-10-0-119-203.ec2.internal-termination.log.gz [must-gather-s5dtj] OUT ./audit_logs/kube-apiserver/ip-10-0-119-203.ec2.internal-audit.log.gz [must-gather-s5dtj] OUT ./audit_logs/kube-apiserver/ip-10-0-40-239.ec2.internal-audit.log.gz [must-gather-s5dtj] OUT ./audit_logs/kube-apiserver/ip-10-0-40-239.ec2.internal-audit-2025-10-31T05-14-54.994.log.gz [must-gather-s5dtj] OUT ./audit_logs/kube-apiserver/ip-10-0-40-239.ec2.internal-termination.log.gz [must-gather-s5dtj] OUT ./audit_logs/kube-apiserver/ip-10-0-52-51.ec2.internal-audit.log.gz [must-gather-s5dtj] OUT ./audit_logs/kube-apiserver/ip-10-0-52-51.ec2.internal-audit-2025-10-31T06-04-20.157.log.gz [must-gather-s5dtj] OUT ./audit_logs/kube-apiserver/ip-10-0-52-51.ec2.internal-termination.log.gz [must-gather-s5dtj] OUT ./audit_logs/kube-apiserver.audit_logs_listing [must-gather-s5dtj] OUT ./audit_logs/oauth-apiserver/ip-10-0-119-203.ec2.internal-audit.log.gz [must-gather-s5dtj] OUT ./audit_logs/oauth-apiserver/ip-10-0-40-239.ec2.internal-audit.log.gz [must-gather-s5dtj] OUT ./audit_logs/oauth-apiserver/ip-10-0-52-51.ec2.internal-audit.log.gz [must-gather-s5dtj] OUT ./audit_logs/oauth-apiserver.audit_logs_listing [must-gather-s5dtj] OUT ./audit_logs/etcd.audit_logs_listing [must-gather-s5dtj] OUT ./audit_logs/oauth-server/ip-10-0-119-203.ec2.internal-audit.log.gz [must-gather-s5dtj] OUT ./audit_logs/oauth-server/ip-10-0-40-239.ec2.internal-audit.log.gz [must-gather-s5dtj] OUT ./audit_logs/oauth-server/ip-10-0-52-51.ec2.internal-audit.log.gz [must-gather-s5dtj] OUT ./audit_logs/oauth-server.audit_logs_listing [must-gather-s5dtj] OUT ./audit_logs/monitoring/metrics-server-5db665f975-57n6s/audit.log [must-gather-s5dtj] OUT ./audit_logs/monitoring/metrics-server-5db665f975-g9kcp/audit.log Ignoring the following flags because they only apply to rsync: -z [must-gather ] OUT namespace/openshift-must-gather-qvlbw deleted [must-gather ] OUT clusterrolebinding.rbac.authorization.k8s.io/must-gather-5ttcn deleted Reprinting Cluster State: When opening a support case, bugzilla, or issue please include the following summary data along with any other requested information: ClusterID: 32d6e132-796d-480d-8c64-00017697401b ClusterVersion: Stable at "4.21.0-0.nightly-2025-10-30-125804" ClusterOperators: All healthy and stable 76M must-gather.local.8393972353396086030 Fri Oct 31 06:20:09 UTC 2025 Attempting to collect kube API server log Starting to serve on 127.0.0.1:8001 * Trying ::1:8001... * connect to ::1 port 8001 failed: Connection refused * Trying 127.0.0.1:8001... * Connected to localhost (127.0.0.1) port 8001 (#0) > GET /logs/kube-apiserver.log HTTP/1.1 > Host: localhost:8001 > User-Agent: curl/7.76.1 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 404 Not Found < Audit-Id: bfb54fe8-c6d1-4996-a7cc-65a3ba7f08c5 < Cache-Control: no-cache, private < Content-Length: 19 < Content-Type: text/plain; charset=utf-8 < Date: Fri, 31 Oct 2025 06:20:14 GMT < Strict-Transport-Security: max-age=31536000; includeSubDomains; preload < X-Content-Type-Options: nosniff < X-Kubernetes-Pf-Flowschema-Uid: f7e95912-a15f-4ee0-8cd5-30bdbcfb8bad < X-Kubernetes-Pf-Prioritylevel-Uid: 1dedc23d-c830-49b5-966a-26f2deffde8c < { [19 bytes data] * Connection #0 to host localhost left intact Fri Oct 31 06:20:14 UTC 2025 Attempting to collect kube API server metrics 06:20:15: Running post command: ['tests/e2e/lib.sh', 'check_stackrox_logs', '/tmp/k8s-service-logs/part-2/k8s-logs'] INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-fsbsk_object.json for OOMKilled INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-k75ft_object.json for OOMKilled INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-wp94p_object.json for OOMKilled INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/central-795644c465-msqhx_object.json for OOMKilled INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/central-db-84b98c8889-fzcq2_object.json for OOMKilled INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-cmgmb_object.json for OOMKilled INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-dnv9p_object.json for OOMKilled INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-nhmnm_object.json for OOMKilled INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-pj5kz_object.json for OOMKilled INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-s9bvx_object.json for OOMKilled INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-v2g62_object.json for OOMKilled INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/config-controller-5f68659754-56qpc_object.json for OOMKilled INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/scanner-7487f9cbb8-mchmc_object.json for OOMKilled INFO: Fri Oct 31 06:20:15 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42_object.json for OOMKilled INFO: Fri Oct 31 06:20:16 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4_object.json for OOMKilled INFO: Fri Oct 31 06:20:16 UTC 2025: Checking /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/webhookserver-84f798856c-55slf_object.json for OOMKilled INFO: Fri Oct 31 06:20:16 UTC 2025: Checking for unexplained restarts by stackrox pods ls: cannot access '/tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/*-previous.log': No such file or directory INFO: Fri Oct 31 06:20:16 UTC 2025: No pod restarts were found INFO: Fri Oct 31 06:20:17 UTC 2025: Checking stackrox pod logs for errors INFO: Fri Oct 31 06:20:17 UTC 2025: Checking app: scanner-db, logs: /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42-db.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42-init-db.log grep: missing ) INFO: Fri Oct 31 06:20:17 UTC 2025: Checking app: config-controller, logs: /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/config-controller-5f68659754-56qpc-manager.log grep: missing ) INFO: Fri Oct 31 06:20:17 UTC 2025: Checking app: central-db, logs: /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/central-db-84b98c8889-fzcq2-central-db.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/central-db-84b98c8889-fzcq2-init-db.log grep: missing ) INFO: Fri Oct 31 06:20:17 UTC 2025: Checking app: scanner, logs: /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/scanner-7487f9cbb8-mchmc-scanner.log grep: missing ) INFO: Fri Oct 31 06:20:17 UTC 2025: Checking app: webhookserver, logs: /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/webhookserver-84f798856c-55slf-webhookserver.log grep: missing ) INFO: Fri Oct 31 06:20:17 UTC 2025: Checking app: collector, logs: /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-cmgmb-collector.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-cmgmb-compliance.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-cmgmb-init-tls-certs.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-cmgmb-node-inventory.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-dnv9p-collector.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-dnv9p-compliance.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-dnv9p-init-tls-certs.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-dnv9p-node-inventory.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-nhmnm-collector.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-nhmnm-compliance.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-nhmnm-init-tls-certs.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-nhmnm-node-inventory.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-pj5kz-collector.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-pj5kz-compliance.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-pj5kz-init-tls-certs.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-pj5kz-node-inventory.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-s9bvx-collector.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-s9bvx-compliance.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-s9bvx-init-tls-certs.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-s9bvx-node-inventory.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-v2g62-collector.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-v2g62-compliance.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-v2g62-init-tls-certs.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/collector-v2g62-node-inventory.log grep: missing ) INFO: Fri Oct 31 06:20:17 UTC 2025: Checking app: admission-control, logs: /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-fsbsk-admission-control.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-fsbsk-init-tls-certs.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-k75ft-admission-control.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-k75ft-init-tls-certs.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-wp94p-admission-control.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-wp94p-init-tls-certs.log grep: missing ) INFO: Fri Oct 31 06:20:17 UTC 2025: Checking app: sensor, logs: /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4-crs.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4-init-tls-certs.log /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4-sensor.log grep: missing ) INFO: Fri Oct 31 06:20:17 UTC 2025: Checking app: central, logs: /tmp/k8s-service-logs/part-2/k8s-logs/stackrox/pods/central-795644c465-msqhx-central.log grep: missing ) 06:20:17: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', '/tmp/qa-part2-misc-logs', 'part-2/qa-part2-misc-logs'] INFO: Fri Oct 31 06:20:17 UTC 2025: Storing artifacts INFO: /tmp/qa-part2-misc-logs is missing, nothing to upload 06:20:17: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', '/tmp/collector-metrics', 'part-2/collector-metrics'] INFO: Fri Oct 31 06:20:17 UTC 2025: Storing artifacts INFO: Fri Oct 31 06:20:17 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:20:21 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/collector-metrics... 06:20:22: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', 'debug-dump', 'part-2/debug-dump'] INFO: Fri Oct 31 06:20:23 UTC 2025: Storing artifacts INFO: Fri Oct 31 06:20:23 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:20:26 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/debug-dump... 06:20:28: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', 'diagnostic-bundle', 'part-2/diagnostic-bundle'] INFO: Fri Oct 31 06:20:28 UTC 2025: Storing artifacts INFO: Fri Oct 31 06:20:28 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:20:31 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/diagnostic-bundle... 06:20:33: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', 'central-data', 'part-2/central-data'] INFO: Fri Oct 31 06:20:33 UTC 2025: Storing artifacts INFO: Fri Oct 31 06:20:33 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:20:37 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/central-data... 06:20:39: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', '/tmp/k8s-service-logs/part-2/k8s-logs', 'part-2/k8s-logs'] INFO: Fri Oct 31 06:20:39 UTC 2025: Storing artifacts INFO: Fri Oct 31 06:20:39 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:20:43 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs... **** **** 06:20:52: post test completed [QA tests part II] **** **** **** 06:20:52: run completed [QA tests part II] **** **** **** 06:20:52: About to run [DB backup and restore] **** **** **** 06:20:52: About to run pre test [DB backup and restore] **** **** **** 06:20:52: pre test completed [DB backup and restore] **** **** **** 06:20:52: About to run test [DB backup and restore] **** Executing DB backup and restore test INFO: Fri Oct 31 06:20:52 UTC 2025: Running a central database backup and restore test (central is expected in namespace stackrox) INFO: Fri Oct 31 06:20:52 UTC 2025: Waiting for Central to be ready in namespace stackrox INFO: Fri Oct 31 06:20:52 UTC 2025: Waiting 600s (increased for openshift-ci provisioned clusters) for central api and 3600 for ingress... INFO: Fri Oct 31 06:20:52 UTC 2025: Waiting for deployment central to be ready in namespace stackrox INFO: Fri Oct 31 06:21:02 UTC 2025: Deployment central is ready in namespace stackrox. INFO: Fri Oct 31 06:21:02 UTC 2025: Central deployment is ready in namespace stackrox. INFO: Fri Oct 31 06:21:02 UTC 2025: Waiting for Central API endpoint INFO: Fri Oct 31 06:21:03 UTC 2025: Found ingress endpoint: a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com INFO: Fri Oct 31 06:21:03 UTC 2025: Attempting to get 6 'ok' responses in a row from https://a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com:443/v1/ping INFO: Fri Oct 31 06:21:03 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:21:05 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:21:07 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:21:09 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:21:11 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:21:13 UTC 2025: Backing up to /tmp/db-backup-restore-test 0.0 b [>>---------------------------------] 0.0 b/s /tmp/db-backup-restore-test/postgres_db_2025_10_31_06_21_13.sql.zip 15.1 MiB [>>>---------------------------] 4.4 MiB/s /tmp/db-backup-restore-test/postgres_db_2025_10_31_06_21_13.sql.zip Wrote backup file to "/tmp/db-backup-restore-test/postgres_db_2025_10_31_06_21_13.sql.zip" INFO: Fri Oct 31 06:21:17 UTC 2025: Updating public config INFO: Fri Oct 31 06:21:17 UTC 2025: Updating public config to ensure that it is overridden by restore INFO: Fri Oct 31 06:21:17 UTC 2025: Restoring from /tmp/db-backup-restore-test/postgres_db_* Transferring data ... Successfully restored DB INFO: Fri Oct 31 06:21:20 UTC 2025: Waiting for Central to be ready in namespace stackrox INFO: Fri Oct 31 06:21:20 UTC 2025: Waiting 600s (increased for openshift-ci provisioned clusters) for central api and 3600 for ingress... INFO: Fri Oct 31 06:21:20 UTC 2025: Waiting for deployment central to be ready in namespace stackrox INFO: Fri Oct 31 06:21:31 UTC 2025: Deployment central is ready in namespace stackrox. INFO: Fri Oct 31 06:21:31 UTC 2025: Central deployment is ready in namespace stackrox. INFO: Fri Oct 31 06:21:31 UTC 2025: Waiting for Central API endpoint INFO: Fri Oct 31 06:21:31 UTC 2025: Found ingress endpoint: a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com INFO: Fri Oct 31 06:21:31 UTC 2025: Attempting to get 6 'ok' responses in a row from https://a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com:443/v1/ping INFO: Fri Oct 31 06:21:31 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:21:33 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:21:35 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:21:37 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:21:39 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:21:41 UTC 2025: Checking to see if restore overwrote previous config **** **** 06:21:41: test completed [DB backup and restore] **** **** **** 06:21:41: About to run post test [DB backup and restore] **** 06:21:41: Running post command: ['tests/e2e/lib.sh', 'wait_for_api'] INFO: Fri Oct 31 06:21:41 UTC 2025: Waiting for Central to be ready in namespace stackrox INFO: Fri Oct 31 06:21:41 UTC 2025: Waiting 600s (increased for openshift-ci provisioned clusters) for central api and 3600 for ingress... INFO: Fri Oct 31 06:21:41 UTC 2025: Waiting for deployment central to be ready in namespace stackrox INFO: Fri Oct 31 06:21:52 UTC 2025: Deployment central is ready in namespace stackrox. INFO: Fri Oct 31 06:21:52 UTC 2025: Central deployment is ready in namespace stackrox. INFO: Fri Oct 31 06:21:52 UTC 2025: Waiting for Central API endpoint INFO: Fri Oct 31 06:21:52 UTC 2025: Found ingress endpoint: a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com INFO: Fri Oct 31 06:21:52 UTC 2025: Attempting to get 6 'ok' responses in a row from https://a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com:443/v1/ping INFO: Fri Oct 31 06:21:52 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:21:54 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:21:56 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:21:58 UTC 2025: Status is now: ok INFO: Fri Oct 31 06:22:00 UTC 2025: Status is now: ok 06:22:02: Running post command: ['scripts/ci/collect-service-logs.sh', 'stackrox', '/tmp/stackrox-logs'] NAME STATUS AGE stackrox Active 117m INFO: Fri Oct 31 06:22:02 UTC 2025: >>> Collecting from namespace stackrox <<< INFO: Fri Oct 31 06:22:02 UTC 2025: >>> Collecting daemonsets from namespace stackrox <<< NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR collector 6 6 6 6 6 114m collector,compliance,node-inventory quay.io/rhacs-eng/collector:3.23.x-8-gec8a0b3bd7,quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6,quay.io/rhacs-eng/scanner-slim:2.37.x-112-gde9f7c100e service=collector INFO: Fri Oct 31 06:22:03 UTC 2025: >>> Collecting deployments from namespace stackrox <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR admission-control 3/3 3 3 114m admission-control quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6 app=admission-control central 1/1 1 1 116m central quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6 app=central central-db 1/1 1 1 116m central-db quay.io/rhacs-eng/central-db:4.10.x-207-g071f40eed6 app=central-db config-controller 1/1 1 1 116m manager quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6 app=config-controller scanner 1/1 1 1 116m scanner quay.io/rhacs-eng/scanner:2.37.x-112-gde9f7c100e app=scanner scanner-db 1/1 1 1 116m db quay.io/rhacs-eng/scanner-db:2.37.x-112-gde9f7c100e app=scanner-db sensor 1/1 1 1 114m sensor quay.io/rhacs-eng/main:4.10.x-207-g071f40eed6 app=sensor webhookserver 1/1 1 1 113m webhookserver quay.io/rhacs-eng/qa-multi-arch:webhookserver-1.2 app=webhookserver INFO: Fri Oct 31 06:22:08 UTC 2025: >>> Collecting services from namespace stackrox <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR admission-control ClusterIP 172.30.19.69 443/TCP 114m app=admission-control central ClusterIP 172.30.45.18 443/TCP,9091/TCP 116m app=central central-db ClusterIP 172.30.22.117 5432/TCP 116m app=central-db central-loadbalancer LoadBalancer 172.30.184.127 a8edf954e573643008e3c74885d9f794-816158633.XXXXXXXXX.elb.amazonaws.com 443:31351/TCP 116m app=central scanner ClusterIP 172.30.30.4 8080/TCP,8443/TCP 116m app=scanner scanner-db ClusterIP 172.30.251.222 5432/TCP 116m app=scanner-db sensor ClusterIP 172.30.63.173 443/TCP,9091/TCP 114m app=sensor sensor-webhook ClusterIP 172.30.9.250 443/TCP 114m app=sensor webhookserver ClusterIP 172.30.145.22 8080/TCP,8443/TCP 113m app=webhookserver INFO: Fri Oct 31 06:22:14 UTC 2025: >>> Collecting pods from namespace stackrox <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES admission-control-7c9bf84889-fsbsk 1/1 Running 0 14m 10.131.0.228 ip-10-0-72-187.ec2.internal admission-control-7c9bf84889-k75ft 1/1 Running 0 14m 10.129.2.59 ip-10-0-28-116.ec2.internal admission-control-7c9bf84889-wp94p 1/1 Running 0 14m 10.128.2.33 ip-10-0-7-77.ec2.internal central-795644c465-msqhx 1/1 Running 0 116m 10.129.2.30 ip-10-0-28-116.ec2.internal central-db-84b98c8889-fzcq2 1/1 Running 0 116m 10.128.2.19 ip-10-0-7-77.ec2.internal collector-cmgmb 3/3 Running 0 114m 10.128.2.23 ip-10-0-7-77.ec2.internal collector-dnv9p 3/3 Running 0 114m 10.129.2.33 ip-10-0-28-116.ec2.internal collector-nhmnm 3/3 Running 0 114m 10.128.0.72 ip-10-0-119-203.ec2.internal collector-pj5kz 3/3 Running 0 114m 10.131.0.24 ip-10-0-72-187.ec2.internal collector-s9bvx 3/3 Running 0 114m 10.129.0.84 ip-10-0-52-51.ec2.internal collector-v2g62 3/3 Running 0 114m 10.130.0.93 ip-10-0-40-239.ec2.internal config-controller-5f68659754-56qpc 1/1 Running 0 116m 10.129.2.28 ip-10-0-28-116.ec2.internal scanner-7487f9cbb8-mchmc 1/1 Running 0 116m 10.131.0.21 ip-10-0-72-187.ec2.internal scanner-db-74f98cd84d-7sg42 1/1 Running 0 116m 10.129.2.29 ip-10-0-28-116.ec2.internal sensor-7b4784c4d5-9ffg4 1/1 Running 0 12m 10.131.0.229 ip-10-0-72-187.ec2.internal webhookserver-84f798856c-55slf 1/1 Running 0 113m 10.131.0.25 ip-10-0-72-187.ec2.internal INFO: Fri Oct 31 06:22:15 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-fsbsk current container admission-control in stackrox... INFO: Fri Oct 31 06:22:15 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-fsbsk current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:22:16 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-k75ft current container admission-control in stackrox... INFO: Fri Oct 31 06:22:16 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-k75ft current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:22:17 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-wp94p current container admission-control in stackrox... INFO: Fri Oct 31 06:22:18 UTC 2025: Dumping log of pods/admission-control-7c9bf84889-wp94p current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:22:19 UTC 2025: Dumping log of pods/central-795644c465-msqhx current container central in stackrox... INFO: Fri Oct 31 06:22:20 UTC 2025: Dumping log of pods/central-db-84b98c8889-fzcq2 current container central-db in stackrox... INFO: Fri Oct 31 06:22:20 UTC 2025: Dumping log of pods/central-db-84b98c8889-fzcq2 current container init-db in stackrox... INFO: Fri Oct 31 06:22:21 UTC 2025: Dumping log of pods/collector-cmgmb current container collector in stackrox... INFO: Fri Oct 31 06:22:21 UTC 2025: Dumping log of pods/collector-cmgmb current container compliance in stackrox... INFO: Fri Oct 31 06:22:22 UTC 2025: Dumping log of pods/collector-cmgmb current container node-inventory in stackrox... INFO: Fri Oct 31 06:22:22 UTC 2025: Dumping log of pods/collector-cmgmb current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:22:23 UTC 2025: Dumping log of pods/collector-dnv9p current container collector in stackrox... INFO: Fri Oct 31 06:22:23 UTC 2025: Dumping log of pods/collector-dnv9p current container compliance in stackrox... INFO: Fri Oct 31 06:22:23 UTC 2025: Dumping log of pods/collector-dnv9p current container node-inventory in stackrox... INFO: Fri Oct 31 06:22:24 UTC 2025: Dumping log of pods/collector-dnv9p current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:22:25 UTC 2025: Dumping log of pods/collector-nhmnm current container collector in stackrox... INFO: Fri Oct 31 06:22:25 UTC 2025: Dumping log of pods/collector-nhmnm current container compliance in stackrox... INFO: Fri Oct 31 06:22:25 UTC 2025: Dumping log of pods/collector-nhmnm current container node-inventory in stackrox... INFO: Fri Oct 31 06:22:26 UTC 2025: Dumping log of pods/collector-nhmnm current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:22:27 UTC 2025: Dumping log of pods/collector-pj5kz current container collector in stackrox... INFO: Fri Oct 31 06:22:27 UTC 2025: Dumping log of pods/collector-pj5kz current container compliance in stackrox... INFO: Fri Oct 31 06:22:27 UTC 2025: Dumping log of pods/collector-pj5kz current container node-inventory in stackrox... INFO: Fri Oct 31 06:22:28 UTC 2025: Dumping log of pods/collector-pj5kz current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:22:28 UTC 2025: Dumping log of pods/collector-s9bvx current container collector in stackrox... INFO: Fri Oct 31 06:22:29 UTC 2025: Dumping log of pods/collector-s9bvx current container compliance in stackrox... INFO: Fri Oct 31 06:22:29 UTC 2025: Dumping log of pods/collector-s9bvx current container node-inventory in stackrox... INFO: Fri Oct 31 06:22:29 UTC 2025: Dumping log of pods/collector-s9bvx current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:22:30 UTC 2025: Dumping log of pods/collector-v2g62 current container collector in stackrox... INFO: Fri Oct 31 06:22:30 UTC 2025: Dumping log of pods/collector-v2g62 current container compliance in stackrox... INFO: Fri Oct 31 06:22:31 UTC 2025: Dumping log of pods/collector-v2g62 current container node-inventory in stackrox... INFO: Fri Oct 31 06:22:31 UTC 2025: Dumping log of pods/collector-v2g62 current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:22:32 UTC 2025: Dumping log of pods/config-controller-5f68659754-56qpc current container manager in stackrox... INFO: Fri Oct 31 06:22:33 UTC 2025: Dumping log of pods/scanner-7487f9cbb8-mchmc current container scanner in stackrox... INFO: Fri Oct 31 06:22:33 UTC 2025: Dumping log of pods/scanner-db-74f98cd84d-7sg42 current container db in stackrox... INFO: Fri Oct 31 06:22:34 UTC 2025: Dumping log of pods/scanner-db-74f98cd84d-7sg42 current container init-db in stackrox... INFO: Fri Oct 31 06:22:35 UTC 2025: Dumping log of pods/sensor-7b4784c4d5-9ffg4 current container sensor in stackrox... INFO: Fri Oct 31 06:22:35 UTC 2025: Dumping log of pods/sensor-7b4784c4d5-9ffg4 current container crs in stackrox... INFO: Fri Oct 31 06:22:35 UTC 2025: Dumping log of pods/sensor-7b4784c4d5-9ffg4 current container init-tls-certs in stackrox... INFO: Fri Oct 31 06:22:36 UTC 2025: Dumping log of pods/webhookserver-84f798856c-55slf current container webhookserver in stackrox... INFO: Fri Oct 31 06:22:36 UTC 2025: >>> Collecting secrets from namespace stackrox <<< NAME TYPE DATA AGE admission-control-dockercfg-p8bhn kubernetes.io/dockercfg 1 115m admission-control-tls Opaque 3 115m builder-dockercfg-df9sv kubernetes.io/dockercfg 1 117m central-admin-pass Opaque 1 117m central-db-dockercfg-75lrj kubernetes.io/dockercfg 1 117m central-db-password Opaque 1 117m central-db-tls Opaque 3 117m central-default-tls-secret kubernetes.io/tls 2 117m central-dockercfg-vfb6p kubernetes.io/dockercfg 1 117m central-htpasswd Opaque 1 117m central-monitoring-tls kubernetes.io/tls 2 117m central-stackrox-central-services-proxy-env Opaque 1 117m central-tls Opaque 5 117m collector-dockercfg-npd4p kubernetes.io/dockercfg 1 115m collector-tls Opaque 3 115m config-controller-dockercfg-c7wx7 kubernetes.io/dockercfg 1 117m default-dockercfg-g7xzt kubernetes.io/dockercfg 1 117m deployer-dockercfg-n4tck kubernetes.io/dockercfg 1 117m helm-cluster-config Opaque 1 115m scanner-db-password Opaque 1 117m scanner-db-tls Opaque 3 117m scanner-dockercfg-lvf9z kubernetes.io/dockercfg 1 117m scanner-tls Opaque 3 117m securedcluster-stackrox-secured-cluster-services-proxy-env Opaque 1 115m sensor-dockercfg-jr4kf kubernetes.io/dockercfg 1 115m sensor-monitoring-tls kubernetes.io/tls 2 115m sensor-tls Opaque 3 115m service-ca Opaque 1 115m sh.helm.release.v1.stackrox-central-services.v1 helm.sh/release.v1 1 117m sh.helm.release.v1.stackrox-secured-cluster-services.v1 helm.sh/release.v1 1 115m sh.helm.release.v1.webhookserver.v1 helm.sh/release.v1 1 114m stackrox kubernetes.io/dockerconfigjson 1 117m tls-cert-admission-control Opaque 3 114m tls-cert-collector Opaque 3 114m tls-cert-scanner Opaque 3 114m tls-cert-scanner-db Opaque 3 114m tls-cert-scanner-v4-db Opaque 3 114m tls-cert-scanner-v4-indexer Opaque 3 114m tls-cert-sensor Opaque 3 114m webhook-server-certs Opaque 2 114m INFO: Fri Oct 31 06:23:03 UTC 2025: >>> Collecting serviceaccounts from namespace stackrox <<< NAME SECRETS AGE admission-control 1 115m builder 1 118m central 1 117m central-db 1 117m collector 1 115m config-controller 1 117m default 1 118m deployer 1 118m scanner 1 117m sensor 1 115m INFO: Fri Oct 31 06:23:09 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace stackrox <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 142m autoscaling.openshift.io 2 159m cluster-baremetal-validating-webhook-configuration 1 159m controlplanemachineset.machine.openshift.io 1 156m machine-api 2 159m monitoringconfigmaps.openshift.io 1 140m multus.openshift.io 1 160m network-node-identity.openshift.io 2 144m performance-addon-operator 1 166m prometheusrules.openshift.io 1 142m stackrox 2 115m INFO: Fri Oct 31 06:23:17 UTC 2025: >>> Collecting catalogsources from namespace stackrox <<< No resources found in stackrox namespace. INFO: Fri Oct 31 06:23:17 UTC 2025: >>> Collecting subscriptions from namespace stackrox <<< No resources found in stackrox namespace. INFO: Fri Oct 31 06:23:18 UTC 2025: >>> Collecting clusterserviceversions from namespace stackrox <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-207-g071f40eed6 Advanced Cluster Security for Kubernetes 4.10.0-207-g071f40eed6 rhacs-operator.v4.9.0 Succeeded INFO: Fri Oct 31 06:23:19 UTC 2025: >>> Collecting central from namespace stackrox <<< NAME AGE stackrox-central-services 118m INFO: Fri Oct 31 06:23:20 UTC 2025: >>> Collecting securedclusters from namespace stackrox <<< NAME AGE stackrox-secured-cluster-services 116m INFO: Fri Oct 31 06:23:21 UTC 2025: >>> Collecting nodes from namespace stackrox <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-119-203.ec2.internal Ready control-plane,master 164m v1.34.1 10.0.119.203 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-28-116.ec2.internal Ready worker 143m v1.34.1 10.0.28.116 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-40-239.ec2.internal Ready control-plane,master 164m v1.34.1 10.0.40.239 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-52-51.ec2.internal Ready control-plane,master 164m v1.34.1 10.0.52.51 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-7-77.ec2.internal Ready worker 143m v1.34.1 10.0.7.77 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-72-187.ec2.internal Ready worker 143m v1.34.1 10.0.72.187 Red Hat Enterprise Linux CoreOS 9.6.20251027-0 (Plow) 5.14.0-570.60.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:23:29: Running post command: ['tests/e2e/lib.sh', 'check_for_errors_in_stackrox_logs', '/tmp/stackrox-logs'] INFO: Fri Oct 31 06:23:29 UTC 2025: Checking stackrox pod logs for errors INFO: Fri Oct 31 06:23:29 UTC 2025: Checking app: scanner-db, logs: /tmp/stackrox-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42-db.log /tmp/stackrox-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42-init-db.log grep: missing ) INFO: Fri Oct 31 06:23:30 UTC 2025: Checking app: config-controller, logs: /tmp/stackrox-logs/stackrox/pods/config-controller-5f68659754-56qpc-manager.log grep: missing ) INFO: Fri Oct 31 06:23:30 UTC 2025: Checking app: central-db, logs: /tmp/stackrox-logs/stackrox/pods/central-db-84b98c8889-fzcq2-central-db.log /tmp/stackrox-logs/stackrox/pods/central-db-84b98c8889-fzcq2-init-db.log grep: missing ) INFO: Fri Oct 31 06:23:30 UTC 2025: Checking app: scanner, logs: /tmp/stackrox-logs/stackrox/pods/scanner-7487f9cbb8-mchmc-scanner.log grep: missing ) INFO: Fri Oct 31 06:23:30 UTC 2025: Checking app: webhookserver, logs: /tmp/stackrox-logs/stackrox/pods/webhookserver-84f798856c-55slf-webhookserver.log grep: missing ) INFO: Fri Oct 31 06:23:30 UTC 2025: Checking app: collector, logs: /tmp/stackrox-logs/stackrox/pods/collector-cmgmb-collector.log /tmp/stackrox-logs/stackrox/pods/collector-cmgmb-compliance.log /tmp/stackrox-logs/stackrox/pods/collector-cmgmb-init-tls-certs.log /tmp/stackrox-logs/stackrox/pods/collector-cmgmb-node-inventory.log /tmp/stackrox-logs/stackrox/pods/collector-dnv9p-collector.log /tmp/stackrox-logs/stackrox/pods/collector-dnv9p-compliance.log /tmp/stackrox-logs/stackrox/pods/collector-dnv9p-init-tls-certs.log /tmp/stackrox-logs/stackrox/pods/collector-dnv9p-node-inventory.log /tmp/stackrox-logs/stackrox/pods/collector-nhmnm-collector.log /tmp/stackrox-logs/stackrox/pods/collector-nhmnm-compliance.log /tmp/stackrox-logs/stackrox/pods/collector-nhmnm-init-tls-certs.log /tmp/stackrox-logs/stackrox/pods/collector-nhmnm-node-inventory.log /tmp/stackrox-logs/stackrox/pods/collector-pj5kz-collector.log /tmp/stackrox-logs/stackrox/pods/collector-pj5kz-compliance.log /tmp/stackrox-logs/stackrox/pods/collector-pj5kz-init-tls-certs.log /tmp/stackrox-logs/stackrox/pods/collector-pj5kz-node-inventory.log /tmp/stackrox-logs/stackrox/pods/collector-s9bvx-collector.log /tmp/stackrox-logs/stackrox/pods/collector-s9bvx-compliance.log /tmp/stackrox-logs/stackrox/pods/collector-s9bvx-init-tls-certs.log /tmp/stackrox-logs/stackrox/pods/collector-s9bvx-node-inventory.log /tmp/stackrox-logs/stackrox/pods/collector-v2g62-collector.log /tmp/stackrox-logs/stackrox/pods/collector-v2g62-compliance.log /tmp/stackrox-logs/stackrox/pods/collector-v2g62-init-tls-certs.log /tmp/stackrox-logs/stackrox/pods/collector-v2g62-node-inventory.log grep: missing ) INFO: Fri Oct 31 06:23:30 UTC 2025: Checking app: admission-control, logs: /tmp/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-fsbsk-admission-control.log /tmp/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-fsbsk-init-tls-certs.log /tmp/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-k75ft-admission-control.log /tmp/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-k75ft-init-tls-certs.log /tmp/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-wp94p-admission-control.log /tmp/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-wp94p-init-tls-certs.log grep: missing ) INFO: Fri Oct 31 06:23:30 UTC 2025: Checking app: sensor, logs: /tmp/stackrox-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4-crs.log /tmp/stackrox-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4-init-tls-certs.log /tmp/stackrox-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4-sensor.log grep: missing ) INFO: Fri Oct 31 06:23:30 UTC 2025: Checking app: central, logs: /tmp/stackrox-logs/stackrox/pods/central-795644c465-msqhx-central.log grep: missing ) 06:23:30: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', '/tmp/db-backup-restore-test', 'db-test/db-backup-restore-test'] INFO: Fri Oct 31 06:23:30 UTC 2025: Storing artifacts INFO: Fri Oct 31 06:23:30 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:23:36 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/db-backup-restore-test... 06:23:38: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', '/tmp/stackrox-logs', 'db-test/stackrox-logs'] INFO: Fri Oct 31 06:23:38 UTC 2025: Storing artifacts INFO: Fri Oct 31 06:23:38 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:23:42 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs... **** **** 06:23:45: post test completed [DB backup and restore] **** **** **** 06:23:45: run completed [DB backup and restore] **** **** **** 06:23:45: About to teardown **** **** **** 06:23:45: teardown completed **** **** **** 06:23:45: About to run final post **** 06:23:45: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', '/tmp/qa-tests-backend-logs', 'final/qa-tests-backend-logs'] INFO: Fri Oct 31 06:23:45 UTC 2025: Storing artifacts INFO: Fri Oct 31 06:23:45 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:23:48 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/final/qa-tests-backend-logs... 06:23:50: Running post command: ['scripts/ci/store-artifacts.sh', 'fixup_artifacts_content_type'] INFO: Fri Oct 31 06:23:50 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/central/stackrox-central-services_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/daemonsets/collector_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/deployments/admission-control_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/deployments/central-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/deployments/central_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/deployments/config-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/deployments/scanner-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/deployments/scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/deployments/sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/deployments/webhookserver_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/nodes/ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/nodes/ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/nodes/ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-fsbsk-admission-control.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-fsbsk-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-k75ft-admission-control.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-fsbsk_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-k75ft-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-k75ft_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-wp94p-admission-control.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-wp94p-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/admission-control-7c9bf84889-wp94p_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/central-795644c465-msqhx-central.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/central-795644c465-msqhx_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-cmgmb-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/central-db-84b98c8889-fzcq2_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/central-db-84b98c8889-fzcq2-init-db.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-cmgmb-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/central-db-84b98c8889-fzcq2-central-db.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-cmgmb-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-cmgmb_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-dnv9p-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-cmgmb-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-dnv9p_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-dnv9p-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-dnv9p-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-nhmnm-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-nhmnm-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-nhmnm_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-nhmnm-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-s9bvx-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-nhmnm-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-s9bvx-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/webhookserver-84f798856c-55slf-webhookserver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-pj5kz_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-dnv9p-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-pj5kz-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-s9bvx-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-pj5kz-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-pj5kz-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-v2g62-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-pj5kz-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/scanner-7487f9cbb8-mchmc_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/config-controller-5f68659754-56qpc_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-v2g62_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/scanner-7487f9cbb8-mchmc-scanner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/config-controller-5f68659754-56qpc-manager.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4-crs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4-sensor.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-v2g62-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42-db.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42-init-db.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-v2g62-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/admission-control-dockercfg-p8bhn_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/admission-control-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-s9bvx_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-s9bvx-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/central-admin-pass_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/central-db-password_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/builder-dockercfg-df9sv_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/collector-v2g62-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/central-db-dockercfg-75lrj_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/webhookserver-84f798856c-55slf_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/central-db-tls_describe.log... / [1 objects] / [2 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/central-default-tls-secret_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/central-dockercfg-vfb6p_describe.log... / [3 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/central-htpasswd_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/central-monitoring-tls_describe.log... / [4 objects] / [5 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/central-stackrox-central-services-proxy-env_describe.log... / [6 objects] / [7 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/central-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/collector-dockercfg-npd4p_describe.log... / [8 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/collector-tls_describe.log... / [9 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/config-controller-dockercfg-c7wx7_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/default-dockercfg-g7xzt_describe.log... / [10 objects] / [11 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/securedcluster-stackrox-secured-cluster-services-proxy-env_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/scanner-db-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/deployer-dockercfg-n4tck_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/helm-cluster-config_describe.log... / [12 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/sensor-dockercfg-jr4kf_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/scanner-db-password_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/scanner-dockercfg-lvf9z_describe.log... / [13 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/scanner-tls_describe.log... / [14 objects] / [15 objects] / [16 objects] / [17 objects] / [18 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/sensor-monitoring-tls_describe.log... / [19 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/sensor-tls_describe.log... / [20 objects] / [21 objects] / [22 objects] / [23 objects] / [24 objects] / [25 objects] / [26 objects] / [27 objects] / [28 objects] / [29 objects] / [30 objects] / [31 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/service-ca_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/sh.helm.release.v1.stackrox-central-services.v1_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/sh.helm.release.v1.stackrox-secured-cluster-services.v1_describe.log... / [32 objects] / [33 objects] / [34 objects] / [35 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/sh.helm.release.v1.webhookserver.v1_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/tls-cert-collector_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/tls-cert-admission-control_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/tls-cert-scanner-v4-db_describe.log... / [36 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/tls-cert-scanner-v4-indexer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/tls-cert-scanner-db_describe.log... / [37 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/tls-cert-scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/tls-cert-sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/secrets/webhook-server-certs_describe.log... / [38 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/securedclusters/stackrox-secured-cluster-services_describe.log... / [39 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/serviceaccounts/admission-control_describe.log... / [40 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/serviceaccounts/builder_describe.log... / [41 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/serviceaccounts/central-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/serviceaccounts/central_describe.log... / [42 objects] / [43 objects] / [44 objects] / [45 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/serviceaccounts/config-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/serviceaccounts/collector_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/serviceaccounts/scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/serviceaccounts/deployer_describe.log... / [46 objects] / [47 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/serviceaccounts/sensor_describe.log... / [48 objects] / [49 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/services/admission-control_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/services/central-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/services/central-loadbalancer_describe.log... / [50 objects] / [51 objects] / [52 objects] / [53 objects] / [54 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/services/scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/services/sensor-webhook_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/services/sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/services/central_describe.log... / [55 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/services/webhookserver_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/services/scanner-db_describe.log... / [56 objects] / [57 objects] / [58 objects] / [59 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... / [60 objects] / [61 objects] / [62 objects] / [63 objects] / [64 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [65 objects] / [66 objects] / [67 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/validatingwebhookconfigurations/machine-api_describe.log... / [68 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/nodes/ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/db-test/stackrox-logs/stackrox/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/nodes/ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/nodes/ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/secrets/builder-dockercfg-2n29b_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/secrets/default-dockercfg-jdzpj_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/secrets/deployer-dockercfg-57xth_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/serviceaccounts/default_describe.log... / [69 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/services/kubernetes_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/services/openshift_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... / [70 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... / [71 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [72 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [73 objects] / [74 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/infrastructure/kube-apiserver.log... / [75 objects] / [76 objects] / [77 objects] / [78 objects] / [79 objects] / [80 objects] / [81 objects] / [82 objects] / [83 objects] / [84 objects] Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... / [85 objects] / [86 objects] / [87 objects] / [88 objects] / [89 objects] / [90 objects] / [91 objects] / [92 objects] / [93 objects] / [94/1.7k objects] 5% Done / [95/1.7k objects] 5% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [96/1.7k objects] 5% Done / [97/1.7k objects] 5% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/nodes/ip-10-0-40-239.ec2.internal_describe.log... / [98/1.7k objects] 5% Done / [99/1.7k objects] 5% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/nodes/ip-10-0-52-51.ec2.internal_describe.log... / [100/1.7k objects] 6% Done / [101/1.7k objects] 6% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/attachdetach-controller-dockercfg-zvdml_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/aws-cloud-provider-dockercfg-llnl8_describe.log... / [102/1.7k objects] 6% Done / [103/1.7k objects] 6% Done / [104/1.7k objects] 6% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/aws-creds_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/builder-dockercfg-5rr4n_describe.log... / [105/1.7k objects] 6% Done / [106/1.7k objects] 6% Done / [107/1.7k objects] 6% Done / [108/1.7k objects] 6% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/certificate-controller-dockercfg-4ts9j_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/cloud-controller-manager-dockercfg-vcvql_describe.log... / [109/1.7k objects] 6% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/clusterrole-aggregation-controller-dockercfg-2d25d_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/cronjob-controller-dockercfg-bwfcs_describe.log... / [110/1.7k objects] 6% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/daemon-set-controller-dockercfg-7rmq8_describe.log... / [111/1.7k objects] 6% Done / [112/1.7k objects] 6% Done / [113/1.7k objects] 6% Done / [114/1.7k objects] 6% Done / [115/1.7k objects] 6% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/deployer-dockercfg-5j8f4_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/deployment-controller-dockercfg-7zlhp_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/default-dockercfg-tqc2v_describe.log... / [116/1.7k objects] 6% Done / [117/1.7k objects] 7% Done / [118/1.7k objects] 7% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/disruption-controller-dockercfg-k4jbk_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/endpoint-controller-dockercfg-hsjvf_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/endpointslice-controller-dockercfg-ckxq9_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/endpointslicemirroring-controller-dockercfg-78tkf_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/ephemeral-volume-controller-dockercfg-pj977_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/generic-garbage-collector-dockercfg-k4nd7_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/expand-controller-dockercfg-c7q6p_describe.log... / [119/1.7k objects] 7% Done / [120/1.7k objects] 7% Done / [121/1.7k objects] 7% Done / [122/1.7k objects] 7% Done / [123/1.7k objects] 7% Done / [124/1.7k objects] 7% Done / [125/1.7k objects] 7% Done / [126/1.7k objects] 7% Done / [127/1.7k objects] 7% Done / [128/1.7k objects] 7% Done / [129/1.7k objects] 7% Done / [130/1.7k objects] 7% Done / [131/1.7k objects] 7% Done / [132/1.7k objects] 7% Done / [133/1.7k objects] 8% Done / [134/1.7k objects] 8% Done / [135/1.7k objects] 8% Done / [136/1.7k objects] 8% Done / [137/1.7k objects] 8% Done / [138/1.7k objects] 8% Done / [139/1.7k objects] 8% Done / [140/1.7k objects] 8% Done / [141/1.7k objects] 8% Done / [142/1.7k objects] 8% Done / [143/1.7k objects] 8% Done / [144/1.7k objects] 8% Done / [145/1.7k objects] 8% Done / [146/1.7k objects] 8% Done / [147/1.7k objects] 8% Done / [148/1.7k objects] 8% Done / [149/1.7k objects] 8% Done / [150/1.7k objects] 9% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/horizontal-pod-autoscaler-dockercfg-jxc9l_describe.log... / [151/1.7k objects] 9% Done / [152/1.7k objects] 9% Done / [153/1.7k objects] 9% Done / [154/1.7k objects] 9% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/kubeadmin_describe.log... / [155/1.7k objects] 9% Done / [156/1.7k objects] 9% Done / [157/1.7k objects] 9% Done / [158/1.7k objects] 9% Done / [159/1.7k objects] 9% Done / [160/1.7k objects] 9% Done / [161/1.7k objects] 9% Done / [162/1.7k objects] 9% Done / [163/1.7k objects] 9% Done / [164/1.7k objects] 9% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/job-controller-dockercfg-6ggtw_describe.log... / [165/1.7k objects] 9% Done / [166/1.7k objects] 9% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/legacy-service-account-token-cleaner-dockercfg-4nmmn_describe.log... / [167/1.7k objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/pvc-protection-controller-dockercfg-44w8f_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/kube-cloud-cfg_describe.log... / [168/1.7k objects] 10% Done / [169/1.7k objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/node-controller-dockercfg-knp2g_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/replicaset-controller-dockercfg-lrfp5_describe.log... / [170/1.7k objects] 10% Done / [171/1.7k objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/namespace-controller-dockercfg-8fvgf_describe.log... / [172/1.7k objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/pv-protection-controller-dockercfg-csndt_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/service-ca-cert-publisher-dockercfg-p6bbk_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/replication-controller-dockercfg-z7j2d_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/persistent-volume-binder-dockercfg-cdn7t_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/validatingadmissionpolicy-status-controller-dockercfg-f5l8m_describe.log... / [173/1.7k objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/selinux-warning-controller-dockercfg-jh2l9_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/resourcequota-controller-dockercfg-xlkzs_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/root-ca-cert-publisher-dockercfg-v6666_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/service-account-controller-dockercfg-w88mk_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/certificate-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/pod-garbage-collector-dockercfg-btkfm_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/volumeattributesclass-protection-controller-dockercfg-z8c9t_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/ttl-after-finished-controller-dockercfg-x8msd_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/service-cidrs-controller-dockercfg-zjjhc_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/attachdetach-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/cronjob-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/aws-cloud-provider_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/job-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/service-controller-dockercfg-dqxjf_describe.log... / [174/1.7k objects] 10% Done / [175/1.7k objects] 10% Done / [176/1.7k objects] 10% Done / [177/1.7k objects] 10% Done / [178/1.7k objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/statefulset-controller-dockercfg-g78jw_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/daemon-set-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/clusterrole-aggregation-controller_describe.log... / [179/1.7k objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/default_describe.log... / [180/1.7k objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/cloud-controller-manager_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/deployment-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/endpoint-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/disruption-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/endpointslice-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/ephemeral-volume-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/horizontal-pod-autoscaler_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/endpointslicemirroring-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/generic-garbage-collector_describe.log... / [181/1.7k objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/namespace-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/expand-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/persistent-volume-binder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/node-controller_describe.log... / [182/1.7k objects] 10% Done / [183/1.7k objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/legacy-service-account-token-cleaner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/pod-garbage-collector_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/pv-protection-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/pvc-protection-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/replicaset-controller_describe.log... / [184/1.7k objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/replication-controller_describe.log... / [185/1.7k objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/resourcequota-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/root-ca-cert-publisher_describe.log... / [186/1.7k objects] 11% Done / [187/1.7k objects] 11% Done / [188/1.7k objects] 11% Done / [189/1.7k objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/selinux-warning-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/service-cidrs-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/service-account-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/service-ca-cert-publisher_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/validatingadmissionpolicy-status-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/statefulset-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/service-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/ttl-after-finished-controller_describe.log... / [190/1.7k objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/volumeattributesclass-protection-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/services/kubelet_describe.log... / [191/1.7k objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... / [192/1.7k objects] 11% Done / [193/1.7k objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [194/1.7k objects] 11% Done / [195/1.7k objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/must-gather.local.8587312116960573582/quay-io-openshift-release-dev-ocp-v4-0-art-dev-sha256-db9c9606365c344966d73b2bf801fc7b47819160e8ec76d8d25ce5cd113f90dc/audit_logs/monitoring/metrics-server-5db665f975-57n6s/audit.log... / [196/1.7k objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/must-gather.local.8587312116960573582/quay-io-openshift-release-dev-ocp-v4-0-art-dev-sha256-db9c9606365c344966d73b2bf801fc7b47819160e8ec76d8d25ce5cd113f90dc/audit_logs/monitoring/metrics-server-5db665f975-g9kcp/audit.log... / [197/1.7k objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... / [198/1.7k objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/deployments/apiserver_describe.log... / [199/1.7k objects] 11% Done / [200/1.7k objects] 12% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/nodes/ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/nodes/ip-10-0-28-116.ec2.internal_describe.log... / [201/1.7k objects] 12% Done / [202/1.7k objects] 12% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/nodes/ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/nodes/ip-10-0-52-51.ec2.internal_describe.log... / [203/1.7k objects] 12% Done / [204/1.7k objects] 12% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/nodes/ip-10-0-7-77.ec2.internal_describe.log... / [205/1.7k objects] 12% Done / [206/1.7k objects] 12% Done / [207/1.7k objects] 12% Done / [208/1.7k objects] 12% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-24s6x-openshift-apiserver-check-endpoints.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-24s6x-openshift-apiserver.log... / [209/1.7k objects] 12% Done / [210/1.7k objects] 12% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-24s6x_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-66628-openshift-apiserver-check-endpoints.log... / [211/1.7k objects] 12% Done / [212/1.7k objects] 12% Done / [213/1.7k objects] 12% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-66628-openshift-apiserver.log... / [214/1.7k objects] 12% Done / [215/1.7k objects] 12% Done / [216/1.7k objects] 13% Done / [217/1.7k objects] 13% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-66628_describe.log... / [218/1.7k objects] 13% Done / [219/1.7k objects] 13% Done / [220/1.7k objects] 13% Done / [221/1.7k objects] 13% Done / [222/1.7k objects] 13% Done / [223/1.7k objects] 13% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-dqbkk-openshift-apiserver-check-endpoints.log... / [224/1.7k objects] 13% Done / [225/1.7k objects] 13% Done / [226/1.7k objects] 13% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-dqbkk_describe.log... / [227/1.7k objects] 13% Done / [228/1.7k objects] 13% Done / [229/1.7k objects] 13% Done / [230/1.7k objects] 13% Done / [231/1.7k objects] 13% Done / [232/1.7k objects] 13% Done / [233/1.7k objects] 14% Done / [234/1.7k objects] 14% Done / [235/1.7k objects] 14% Done / [236/1.7k objects] 14% Done / [237/1.7k objects] 14% Done / [238/1.7k objects] 14% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-dqbkk-openshift-apiserver.log... / [239/1.7k objects] 14% Done / [240/1.7k objects] 14% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/secrets/default-dockercfg-ghcts_describe.log... / [241/1.7k objects] 14% Done / [242/1.7k objects] 14% Done / [243/1.7k objects] 14% Done / [244/1.7k objects] 14% Done / [245/1.7k objects] 14% Done / [246/1.7k objects] 14% Done / [247/1.7k objects] 14% Done / [248/1.7k objects] 14% Done / [249/1.7k objects] 14% Done / [250/1.7k objects] 15% Done / [251/1.7k objects] 15% Done / [252/1.7k objects] 15% Done / [253/1.7k objects] 15% Done / [254/1.7k objects] 15% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/secrets/builder-dockercfg-vhrn6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/secrets/deployer-dockercfg-gptsd_describe.log... / [255/1.7k objects] 15% Done / [256/1.7k objects] 15% Done / [257/1.7k objects] 15% Done / [258/1.7k objects] 15% Done / [259/1.7k objects] 15% Done / [260/1.7k objects] 15% Done / [261/1.7k objects] 15% Done / [262/1.7k objects] 15% Done / [263/1.7k objects] 15% Done / [264/1.7k objects] 15% Done / [265/1.7k objects] 15% Done / [266/1.7k objects] 16% Done / [267/1.7k objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/secrets/etcd-client_describe.log... / [268/1.7k objects] 16% Done / [269/1.7k objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/secrets/openshift-apiserver-sa-dockercfg-v8mlz_describe.log... / [270/1.7k objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/serviceaccounts/deployer_describe.log... / [271/1.7k objects] 16% Done / [272/1.7k objects] 16% Done / [273/1.7k objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/serviceaccounts/openshift-apiserver-sa_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/secrets/serving-cert_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... / [274/1.7k objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/services/api_describe.log... / [275/1.7k objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/services/check-endpoints_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/machine-api_describe.log... / [276/1.7k objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [277/1.7k objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... / [278/1.7k objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/nodes/ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/nodes/ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/nodes/ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/pods/oauth-openshift-86f58ccd9-2mr7g-oauth-openshift.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/deployments/oauth-openshift_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/pods/oauth-openshift-86f58ccd9-2mr7g_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/builder-dockercfg-v8zqj_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/pods/oauth-openshift-86f58ccd9-cm656-oauth-openshift.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/pods/oauth-openshift-86f58ccd9-cm656_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/pods/oauth-openshift-86f58ccd9-rfb7j-oauth-openshift.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/deployer-dockercfg-dznrg_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/pods/oauth-openshift-86f58ccd9-rfb7j_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/default-dockercfg-vxdd4_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/v4-0-config-system-router-certs_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/oauth-openshift-dockercfg-7vr7j_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/v4-0-config-system-ocp-branding-template_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/v4-0-config-system-serving-cert_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/v4-0-config-system-session_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/services/oauth-openshift_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/serviceaccounts/oauth-openshift_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [279/1.7k objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/deployments/controller-manager_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [280/1.7k objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/nodes/ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/nodes/ip-10-0-52-51.ec2.internal_describe.log... / [281/1.7k objects] 16% Done / [282/1.7k objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/nodes/ip-10-0-72-187.ec2.internal_describe.log... / [283/1.7k objects] 17% Done / [284/1.7k objects] 17% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/pods/controller-manager-5d7d85d87d-7cs4c-controller-manager.log... / [285/1.7k objects] 17% Done / [286/1.7k objects] 17% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/pods/controller-manager-5d7d85d87d-7cs4c_describe.log... / [287/1.7k objects] 17% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/pods/controller-manager-5d7d85d87d-b8b4t-controller-manager.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/pods/controller-manager-5d7d85d87d-b8b4t_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/pods/controller-manager-5d7d85d87d-c44qj-controller-manager.log... / [288/1.7k objects] 17% Done / [289/1.7k objects] 17% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/pods/controller-manager-5d7d85d87d-c44qj_describe.log... / [290/1.7k objects] 17% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/secrets/builder-dockercfg-ddf6h_describe.log... / [291/1.7k objects] 17% Done / [292/1.7k objects] 17% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/secrets/default-dockercfg-v29nc_describe.log... / [293/1.7k objects] 17% Done / [294/1.7k objects] 17% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/secrets/deployer-dockercfg-sd6hg_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/secrets/openshift-controller-manager-sa-dockercfg-s528s_describe.log... / [295/1.7k objects] 17% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/secrets/serving-cert_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/serviceaccounts/default_describe.log... / [296/1.7k objects] 17% Done / [297/1.7k objects] 17% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/serviceaccounts/deployer_describe.log... / [298/1.7k objects] 17% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/serviceaccounts/openshift-controller-manager-sa_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/services/controller-manager_describe.log... / [299/1.7k objects] 18% Done / [300/1.7k objects] 18% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... / [301/1.7k objects] 18% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... / [302/1.7k objects] 18% Done / [303/1.7k objects] 18% Done / [304/1.7k objects] 18% Done / [305/1.7k objects] 18% Done / [306/1.7k objects] 18% Done / [307/1.7k objects] 18% Done / [308/1.7k objects] 18% Done / [309/1.7k objects] 18% Done / [310/1.7k objects] 18% Done / [311/1.7k objects] 18% Done / [312/1.7k objects] 18% Done / [313/1.7k objects] 18% Done / [314/1.7k objects] 18% Done / [315/1.7k objects] 18% Done / [316/1.7k objects] 19% Done / [317/1.7k objects] 19% Done / [318/1.7k objects] 19% Done / [319/1.7k objects] 19% Done / [320/1.7k objects] 19% Done / [321/1.7k objects] 19% Done / [322/1.7k objects] 19% Done / [323/1.7k objects] 19% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [324/1.7k objects] 19% Done / [325/1.7k objects] 19% Done / [326/1.7k objects] 19% Done / [327/1.7k objects] 19% Done / [328/1.7k objects] 19% Done / [329/1.7k objects] 19% Done / [330/1.7k objects] 19% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/machine-api_describe.log... / [331/1.7k objects] 19% Done / [332/1.7k objects] 19% Done / [333/1.7k objects] 20% Done / [334/1.7k objects] 20% Done / [335/1.7k objects] 20% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... / [336/1.7k objects] 20% Done / [337/1.7k objects] 20% Done / [338/1.7k objects] 20% Done / [339/1.7k objects] 20% Done / [340/1.7k objects] 20% Done / [341/1.7k objects] 20% Done / [342/1.7k objects] 20% Done / [343/1.7k objects] 20% Done / [344/1.7k objects] 20% Done / [345/1.7k objects] 20% Done / [346/1.7k objects] 20% Done / [347/1.7k objects] 20% Done / [348/1.7k objects] 20% Done / [349/1.7k objects] 21% Done / [350/1.7k objects] 21% Done / [351/1.7k objects] 21% Done / [352/1.7k objects] 21% Done / [353/1.7k objects] 21% Done / [354/1.7k objects] 21% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [355/1.7k objects] 21% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/daemonsets/node-resolver_describe.log... / [356/1.7k objects] 21% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [357/1.7k objects] 21% Done / [358/1.7k objects] 21% Done / [359/1.7k objects] 21% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... / [360/1.7k objects] 21% Done / [361/1.7k objects] 21% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/daemonsets/dns-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/nodes/ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/nodes/ip-10-0-52-51.ec2.internal_describe.log... / [362/1.7k objects] 21% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-5g8pg_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-7xm8x-kube-rbac-proxy.log... / [363/1.7k objects] 21% Done / [364/1.7k objects] 21% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-7xm8x-dns.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-5g8pg-dns.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-5g8pg-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-7xm8x_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-ncbxz-dns.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-ncbxz_describe.log... / [365/1.7k objects] 21% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-ncbxz-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-wkz9f-dns.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-qs2bx-dns.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-wkz9f-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-nttfc_describe.log... / [366/1.7k objects] 22% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-nttfc-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-nttfc-dns.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-qs2bx_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-2kkpw-dns-node-resolver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-2zg7g-dns-node-resolver.log... / [367/1.7k objects] 22% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-2kkpw_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-qs2bx-kube-rbac-proxy.log... / [368/1.7k objects] 22% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-ctldt-dns-node-resolver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-ctldt_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-2zg7g_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-4khpf-dns-node-resolver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-4khpf_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-pdnsn-dns-node-resolver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-wkz9f_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-pdnsn_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/secrets/default-dockercfg-cg7v9_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/secrets/deployer-dockercfg-74sjc_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-sh6p8-dns-node-resolver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/secrets/dns-default-metrics-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-sh6p8_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/secrets/builder-dockercfg-mn5dk_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/secrets/dns-dockercfg-p8lt7_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/secrets/node-resolver-dockercfg-kp4t8_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/serviceaccounts/builder_describe.log... / [369/1.7k objects] 22% Done / [370/1.7k objects] 22% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/serviceaccounts/dns_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/services/dns-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/serviceaccounts/node-resolver_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... / [371/1.7k objects] 22% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [372/1.7k objects] 22% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... / [373/1.7k objects] 22% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [374/1.7k objects] 22% Done / [375/1.7k objects] 22% Done / [376/1.7k objects] 22% Done / [377/1.7k objects] 22% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/nodes/ip-10-0-40-239.ec2.internal_describe.log... / [378/1.7k objects] 22% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/nodes/ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/nodes/ip-10-0-72-187.ec2.internal_describe.log... / [379/1.7k objects] 22% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-guard-ip-10-0-119-203.ec2.internal_describe.log... / [380/1.7k objects] 22% Done / [381/1.7k objects] 22% Done / [382/1.7k objects] 22% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-guard-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-guard-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-119-203.ec2.internal-etcd-metrics.log... / [383/1.7k objects] 23% Done / [384/1.7k objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-119-203.ec2.internal-etcd-readyz.log... / [385/1.7k objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-119-203.ec2.internal-etcd-rev.log... / [386/1.7k objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-119-203.ec2.internal-etcd.log... / [387/1.7k objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-119-203.ec2.internal-setup.log... / [388/1.7k objects] 23% Done / [389/1.7k objects] 23% Done / [390/1.7k objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-40-239.ec2.internal-etcd-readyz.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-40-239.ec2.internal-etcd-metrics.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-40-239.ec2.internal-etcd-rev.log... / [391/1.7k objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-40-239.ec2.internal-etcd.log... / [392/1.7k objects] 23% Done / [393/1.7k objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-40-239.ec2.internal-setup.log... / [394/1.7k objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-40-239.ec2.internal_describe.log... / [395/1.7k objects] 23% Done / [396/1.7k objects] 23% Done / [397/1.7k objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-52-51.ec2.internal-etcd-metrics.log... / [398/1.7k objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-52-51.ec2.internal-etcd-readyz.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-52-51.ec2.internal-etcd-rev.log... / [399/1.7k objects] 24% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-52-51.ec2.internal-etcd.log... / [400/1.7k objects] 24% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-52-51.ec2.internal-setup.log... / [401/1.7k objects] 24% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-5-ip-10-0-40-239.ec2.internal-installer.log... / [402/1.7k objects] 24% Done / [403/1.7k objects] 24% Done / [404/1.7k objects] 24% Done / [405/1.7k objects] 24% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-5-ip-10-0-40-239.ec2.internal_describe.log... / [406/1.7k objects] 24% Done / [407/1.7k objects] 24% Done / [408/1.7k objects] 24% Done / [409/1.7k objects] 24% Done / [410/1.7k objects] 24% Done / [411/1.7k objects] 24% Done / [412/1.7k objects] 24% Done / [413/1.7k objects] 24% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-5-ip-10-0-52-51.ec2.internal_describe.log... / [414/1.7k objects] 24% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-5-ip-10-0-52-51.ec2.internal-installer.log... / [415/1.7k objects] 24% Done / [416/1.7k objects] 25% Done / [417/1.7k objects] 25% Done / [418/1.7k objects] 25% Done / [419/1.7k objects] 25% Done / [420/1.7k objects] 25% Done / [421/1.7k objects] 25% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-119-203.ec2.internal-installer.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-52-51.ec2.internal-installer.log... / [422/1.7k objects] 25% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-40-239.ec2.internal-installer.log... / [423/1.7k objects] 25% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-40-239.ec2.internal-installer.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-119-203.ec2.internal-installer.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-119-203.ec2.internal-pruner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-52-51.ec2.internal-pruner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-52-51.ec2.internal-installer.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-40-239.ec2.internal-pruner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-119-203.ec2.internal-pruner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-119-203.ec2.internal_describe.log... / [424/1.7k objects] 25% Done / [425/1.7k objects] 25% Done / [426/1.7k objects] 25% Done / [427/1.7k objects] 25% Done / [428/1.7k objects] 25% Done / [429/1.7k objects] 25% Done / [430/1.7k objects] 25% Done / [431/1.7k objects] 25% Done / [432/1.7k objects] 26% Done / [433/1.7k objects] 26% Done / [434/1.7k objects] 26% Done / [435/1.7k objects] 26% Done / [436/1.7k objects] 26% Done / [437/1.7k objects] 26% Done / [438/1.7k objects] 26% Done / [439/1.7k objects] 26% Done / [440/1.7k objects] 26% Done / [441/1.7k objects] 26% Done / [442/1.7k objects] 26% Done / [443/1.7k objects] 26% Done / [444/1.7k objects] 26% Done / [445/1.7k objects] 26% Done / [446/1.7k objects] 26% Done / [447/1.7k objects] 26% Done / [448/1.7k objects] 26% Done / [449/1.7k objects] 27% Done / [450/1.7k objects] 27% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/default-dockercfg-p8x5v_describe.log... / [451/1.7k objects] 27% Done / [452/1.7k objects] 27% Done / [453/1.7k objects] 27% Done / [454/1.7k objects] 27% Done / [455/1.7k objects] 27% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/builder-dockercfg-jlctz_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/deployer-dockercfg-lxvxc_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-40-239.ec2.internal-pruner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-52-51.ec2.internal-pruner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-metric-client_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-all-certs-8_describe.log... / [456/1.7k objects] 27% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-backup-sa-dockercfg-5rhbv_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-ip-10-0-119-203.ec2.internal_describe.log... / [457/1.7k objects] 27% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-all-certs-5_describe.log... / [458/1.7k objects] 27% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-all-certs-4_describe.log... / [459/1.7k objects] 27% Done / [460/1.7k objects] 27% Done / [461/1.7k objects] 27% Done / [462/1.7k objects] 27% Done / [463/1.7k objects] 27% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-metric-signer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-metrics-ip-10-0-145-168_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-ip-10-0-145-168_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-all-certs_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-all-certs-6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-peer-ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-client_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-peer-ip-10-0-145-168_describe.log... / [464/1.7k objects] 27% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-peer-ip-10-0-40-239.ec2.internal_describe.log... / [465/1.7k objects] 27% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-all-certs-7_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-peer-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-metrics-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-metrics-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-sa-dockercfg-gfmkj_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-signer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/installer-sa-dockercfg-hrqr5_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-metrics-ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-ip-10-0-52-51.ec2.internal_describe.log... / [466/1.7k objects] 28% Done / [467/1.7k objects] 28% Done / [468/1.7k objects] 28% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/serviceaccounts/builder_describe.log... / [469/1.7k objects] 28% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/serving-cert_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/serviceaccounts/installer-sa_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/services/etcd_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/serviceaccounts/etcd-backup-sa_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/serviceaccounts/etcd-sa_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/machine-api_describe.log... / [470/1.7k objects] 28% Done / [471/1.7k objects] 28% Done / [472/1.7k objects] 28% Done / [473/1.7k objects] 28% Done / [474/1.7k objects] 28% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [475/1.7k objects] 28% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... / [476/1.7k objects] 28% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... / [477/1.7k objects] 28% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/deployments/router-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [478/1.7k objects] 28% Done / [479/1.7k objects] 28% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/nodes/ip-10-0-28-116.ec2.internal_describe.log... / [480/1.7k objects] 28% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/nodes/ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/nodes/ip-10-0-52-51.ec2.internal_describe.log... / [481/1.7k objects] 28% Done / [482/1.7k objects] 29% Done / [483/1.7k objects] 29% Done / [484/1.7k objects] 29% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/nodes/ip-10-0-7-77.ec2.internal_describe.log... / [485/1.7k objects] 29% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/pods/router-default-5c65bb8759-k9k7w-router.log... / [486/1.7k objects] 29% Done / [487/1.7k objects] 29% Done / [488/1.7k objects] 29% Done / [489/1.7k objects] 29% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/pods/router-default-5c65bb8759-k9k7w_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/pods/router-default-5c65bb8759-z9czs_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/pods/router-default-5c65bb8759-z9czs-router.log... / [490/1.7k objects] 29% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/builder-dockercfg-6kd7x_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/default-dockercfg-nqzj6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/deployer-dockercfg-fwwnj_describe.log... / [491/1.7k objects] 29% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/router-certs-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/router-dockercfg-znssc_describe.log... / [492/1.7k objects] 29% Done / [493/1.7k objects] 29% Done / [494/1.7k objects] 29% Done / [495/1.7k objects] 29% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/router-metrics-certs-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/router-stats-default_describe.log... / [496/1.7k objects] 29% Done / [497/1.7k objects] 29% Done / [498/1.7k objects] 29% Done / [499/1.7k objects] 30% Done / [500/1.7k objects] 30% Done / [501/1.7k objects] 30% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/serviceaccounts/builder_describe.log... / [502/1.7k objects] 30% Done / [503/1.7k objects] 30% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/serviceaccounts/router_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/services/router-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/services/router-internal-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [504/1.7k objects] 30% Done / [505/1.7k objects] 30% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/machine-api_describe.log... / [506/1.7k objects] 30% Done / [507/1.7k objects] 30% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [508/1.7k objects] 30% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... / [509/1.7k objects] 30% Done / [510/1.7k objects] 30% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [511/1.7k objects] 30% Done / [512/1.7k objects] 30% Done / [513/1.7k objects] 30% Done / [514/1.7k objects] 30% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... / [515/1.7k objects] 31% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/catalogsources/certified-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/catalogsources/community-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/catalogsources/redhat-marketplace_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/catalogsources/redhat-operators_describe.log... / [516/1.7k objects] 31% Done / [517/1.7k objects] 31% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... / [518/1.7k objects] 31% Done / [519/1.7k objects] 31% Done / [520/1.7k objects] 31% Done / [521/1.7k objects] 31% Done / [522/1.7k objects] 31% Done / [523/1.7k objects] 31% Done / [524/1.7k objects] 31% Done / [525/1.7k objects] 31% Done / [526/1.7k objects] 31% Done / [527/1.7k objects] 31% Done / [528/1.7k objects] 31% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/nodes/ip-10-0-52-51.ec2.internal_describe.log... / [529/1.7k objects] 31% Done / [530/1.7k objects] 31% Done / [531/1.7k objects] 31% Done / [532/1.7k objects] 32% Done / [533/1.7k objects] 32% Done / [534/1.7k objects] 32% Done / [535/1.7k objects] 32% Done / [536/1.7k objects] 32% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/nodes/ip-10-0-7-77.ec2.internal_describe.log... / [537/1.7k objects] 32% Done / [538/1.7k objects] 32% Done / [539/1.7k objects] 32% Done / [540/1.7k objects] 32% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [541/1.7k objects] 32% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/nodes/ip-10-0-28-116.ec2.internal_describe.log... / [542/1.7k objects] 32% Done / [543/1.7k objects] 32% Done / [544/1.7k objects] 32% Done / [545/1.7k objects] 32% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/deployments/marketplace-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/nodes/ip-10-0-40-239.ec2.internal_describe.log... / [546/1.7k objects] 32% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/nodes/ip-10-0-72-187.ec2.internal_describe.log... / [547/1.7k objects] 32% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/community-operators-bfkhb-registry-server.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/certified-operators-p4cqh-registry-server.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/community-operators-bfkhb_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/marketplace-operator-59f9fd9b7-hhzg9_describe.log... / [548/1.7k objects] 32% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/certified-operators-p4cqh_describe.log... / [549/1.7k objects] 33% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/marketplace-operator-59f9fd9b7-hhzg9-marketplace-operator-prev-success.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/redhat-marketplace-b9zcc-registry-server.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/redhat-operators-j85mj_describe.log... / [550/1.7k objects] 33% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/marketplace-operator-59f9fd9b7-hhzg9-marketplace-operator.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/redhat-marketplace-b9zcc_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/community-operators-dockercfg-wgjfb_describe.log... / [551/1.7k objects] 33% Done / [552/1.7k objects] 33% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/redhat-operators-j85mj-registry-server.log... / [553/1.7k objects] 33% Done / [554/1.7k objects] 33% Done / [555/1.7k objects] 33% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/deployer-dockercfg-gxd6l_describe.log... / [556/1.7k objects] 33% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/certified-operators-dockercfg-8dqpl_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/builder-dockercfg-clrc9_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/marketplace-operator-dockercfg-gjpf6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/marketplace-operator-metrics_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/default-dockercfg-9hdtx_describe.log... / [557/1.7k objects] 33% Done / [558/1.7k objects] 33% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/redhat-marketplace-dockercfg-jg892_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/community-operators_describe.log... / [559/1.7k objects] 33% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/certified-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/redhat-operators-dockercfg-fjnhf_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/default_describe.log... / [560/1.7k objects] 33% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/marketplace-operator_describe.log... / [561/1.7k objects] 33% Done / [562/1.7k objects] 33% Done / [563/1.7k objects] 33% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/redhat-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/redhat-marketplace_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/services/redhat-marketplace_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/services/certified-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/services/community-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/services/redhat-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/services/marketplace-operator-metrics_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... / [564/1.7k objects] 33% Done / [565/1.7k objects] 34% Done / [566/1.7k objects] 34% Done / [567/1.7k objects] 34% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... / [568/1.7k objects] 34% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/daemonsets/qa-e2e_describe.log... / [569/1.7k objects] 34% Done / [570/1.7k objects] 34% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/daemonsets/stackrox-images_describe.log... / [571/1.7k objects] 34% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/deployments/qa-e2e-metrics_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/deployments/stackrox-images-metrics_describe.log... / [572/1.7k objects] 34% Done / [573/1.7k objects] 34% Done / [574/1.7k objects] 34% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [575/1.7k objects] 34% Done / [576/1.7k objects] 34% Done / [577/1.7k objects] 34% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/nodes/ip-10-0-40-239.ec2.internal_describe.log... / [578/1.7k objects] 34% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/nodes/ip-10-0-52-51.ec2.internal_describe.log... / [579/1.7k objects] 34% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-2k5lw-prefetch.log... / [580/1.7k objects] 34% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-2k5lw-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-2k5lw_describe.log... / [581/1.7k objects] 34% Done / [582/1.7k objects] 35% Done / [583/1.7k objects] 35% Done / [584/1.7k objects] 35% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-4s8tw-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-4s8tw-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-4s8tw_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-72nmb-prefetch.log... / [585/1.7k objects] 35% Done / [586/1.7k objects] 35% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-72nmb-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-72nmb_describe.log... / [587/1.7k objects] 35% Done / [588/1.7k objects] 35% Done / [589/1.7k objects] 35% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-hp2qk-prefetch.log... / [590/1.7k objects] 35% Done / [591/1.7k objects] 35% Done / [592/1.7k objects] 35% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-hp2qk-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-hp2qk_describe.log... / [593/1.7k objects] 35% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-hwkkq-prefetch.log... / [594/1.7k objects] 35% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-hwkkq-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-hwkkq_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-metrics-7fdf959548-7g84w-aggregator.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-metrics-7fdf959548-7g84w_describe.log... / [595/1.7k objects] 35% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-wb7f5-prefetch.log... / [596/1.7k objects] 35% Done / [597/1.7k objects] 35% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-wb7f5-sleep.log... / [598/1.7k objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-wb7f5_describe.log... / [599/1.7k objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-6rqv9-prefetch.log... / [600/1.7k objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-6rqv9-sleep.log... / [601/1.7k objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-6rqv9_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-bqn6c-prefetch.log... / [602/1.7k objects] 36% Done / [603/1.7k objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-bqn6c-sleep.log... / [604/1.7k objects] 36% Done / [605/1.7k objects] 36% Done / [606/1.7k objects] 36% Done / [607/1.7k objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-bqn6c_describe.log... / [608/1.7k objects] 36% Done / [609/1.7k objects] 36% Done / [610/1.7k objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-hcczx-prefetch.log... / [611/1.7k objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-hcczx-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-hcczx_describe.log... / [612/1.7k objects] 36% Done / [613/1.7k objects] 36% Done / [614/1.7k objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-lhrlk-sleep.log... / [615/1.7k objects] 37% Done / [616/1.7k objects] 37% Done / [617/1.7k objects] 37% Done / [618/1.7k objects] 37% Done / [619/1.7k objects] 37% Done / [620/1.7k objects] 37% Done / [621/1.7k objects] 37% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-lhrlk-prefetch.log... / [622/1.7k objects] 37% Done / [623/1.7k objects] 37% Done / [624/1.7k objects] 37% Done / [625/1.7k objects] 37% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-xl9cv-prefetch.log... / [626/1.7k objects] 37% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-pvqkv_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-metrics-8d848757-98ctr-aggregator.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-metrics-8d848757-98ctr_describe.log... / [627/1.7k objects] 37% Done / [628/1.7k objects] 37% Done / [629/1.7k objects] 37% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-xl9cv_describe.log... / [630/1.7k objects] 37% Done / [631/1.7k objects] 37% Done / [632/1.7k objects] 38% Done / [633/1.7k objects] 38% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-lhrlk_describe.log... / [634/1.7k objects] 38% Done / [635/1.7k objects] 38% Done / [636/1.7k objects] 38% Done / [637/1.7k objects] 38% Done / [638/1.7k objects] 38% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-xl9cv-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-pvqkv-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-pvqkv-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/secrets/default-dockercfg-4rgn5_describe.log... / [639/1.7k objects] 38% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/secrets/deployer-dockercfg-c78n5_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/secrets/builder-dockercfg-tlkdx_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/secrets/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/serviceaccounts/default_describe.log... / [640/1.7k objects] 38% Done / [641/1.7k objects] 38% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/services/qa-e2e-metrics_describe.log... / [642/1.7k objects] 38% Done / [643/1.7k objects] 38% Done / [644/1.7k objects] 38% Done / [645/1.7k objects] 38% Done / [646/1.7k objects] 38% Done / [647/1.7k objects] 38% Done / [648/1.7k objects] 39% Done / [649/1.7k objects] 39% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... / [650/1.7k objects] 39% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/services/stackrox-images-metrics_describe.log... / [651/1.7k objects] 39% Done / [652/1.7k objects] 39% Done / [653/1.7k objects] 39% Done / [654/1.7k objects] 39% Done / [655/1.7k objects] 39% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/machine-api_describe.log... / [656/1.7k objects] 39% Done / [657/1.7k objects] 39% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... / [658/1.7k objects] 39% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... / [659/1.7k objects] 39% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... / [660/1.7k objects] 39% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/catalogsources/stackrox-operator-test-index_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/nodes/ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/deployments/rhacs-operator-controller-manager_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/nodes/ip-10-0-40-239.ec2.internal_describe.log... / [661/1.7k objects] 39% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq-extract.log... / [662/1.7k objects] 39% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/nodes/ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq-pull.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/rhacs-operator-controller-manager-7b9d48dc97-n6jrj-manager.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq-util.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/stackrox-operator-test-index-q698h-registry-server.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/stackrox-operator-test-index-q698h_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/secrets/default-dockercfg-hk546_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/rhacs-operator-controller-manager-7b9d48dc97-n6jrj_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/secrets/builder-dockercfg-ldfjm_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/secrets/rhacs-operator-controller-manager-dockercfg-8tq26_describe.log... / [663/1.7k objects] 39% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/secrets/deployer-dockercfg-d5lwg_describe.log... / [664/1.7k objects] 39% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/secrets/stackrox-operator-test-index-dockercfg-k8tbd_describe.log... / [665/1.7k objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/serviceaccounts/rhacs-operator-controller-manager_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/serviceaccounts/stackrox-operator-test-index_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/services/rhacs-operator-controller-manager-metrics-service_describe.log... / [666/1.7k objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/services/stackrox-operator-test-index_describe.log... / [667/1.7k objects] 40% Done / [668/1.7k objects] 40% Done / [669/1.7k objects] 40% Done / [670/1.7k objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/subscriptions/stackrox-operator-test-subscription_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... / [671/1.7k objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... / [672/1.7k objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [673/1.7k objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... / [674/1.7k objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [675/1.7k objects] 40% Done / [676/1.7k objects] 40% Done / [677/1.7k objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [678/1.7k objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/stackrox_describe.log... / [679/1.7k objects] 40% Done / [680/1.7k objects] 40% Done / [681/1.7k objects] 40% Done / [682/1.7k objects] 41% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/central/stackrox-central-services_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/daemonsets/collector_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/admission-control_describe.log... / [683/1.7k objects] 41% Done / [684/1.7k objects] 41% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/central-db_describe.log... / [685/1.7k objects] 41% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/central_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/config-controller_describe.log... / [686/1.7k objects] 41% Done / [687/1.7k objects] 41% Done / [688/1.7k objects] 41% Done / [689/1.7k objects] 41% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/scanner-db_describe.log... / [690/1.7k objects] 41% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/webhookserver_describe.log... / [691/1.7k objects] 41% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [692/1.7k objects] 41% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/nodes/ip-10-0-40-239.ec2.internal_describe.log... / [693/1.7k objects] 41% Done / [694/1.7k objects] 41% Done / [695/1.7k objects] 41% Done / [696/1.7k objects] 41% Done / [697/1.7k objects] 41% Done / [698/1.7k objects] 42% Done / [699/1.7k objects] 42% Done / [700/1.7k objects] 42% Done / [701/1.7k objects] 42% Done / [702/1.7k objects] 42% Done / [703/1.7k objects] 42% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-ljwt9-admission-control.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-ljwt9_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-ljwt9-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/nodes/ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-qhbkl-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-qhbkl_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-tzjw7-admission-control.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-qhbkl-admission-control.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-tzjw7-init-tls-certs.log... / [704/1.7k objects] 42% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-7c9bf84889-tzjw7_describe.log... / [705/1.7k objects] 42% Done / [706/1.7k objects] 42% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/central-795644c465-msqhx-central.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/central-795644c465-msqhx_describe.log... / [707/1.7k objects] 42% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/central-db-84b98c8889-fzcq2-central-db.log... / [708/1.7k objects] 42% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/central-db-84b98c8889-fzcq2-init-db.log... / [709/1.7k objects] 42% Done / [710/1.7k objects] 42% Done / [711/1.7k objects] 42% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/central-db-84b98c8889-fzcq2_describe.log... / [712/1.7k objects] 42% Done / [713/1.7k objects] 42% Done / [714/1.7k objects] 42% Done / [715/1.7k objects] 43% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-cmgmb-collector.log... / [716/1.7k objects] 43% Done / [717/1.7k objects] 43% Done / [718/1.7k objects] 43% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-cmgmb-compliance.log... / [719/1.7k objects] 43% Done / [720/1.7k objects] 43% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-cmgmb-init-tls-certs.log... / [721/1.7k objects] 43% Done / [722/1.7k objects] 43% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-cmgmb-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-dnv9p-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-dnv9p-collector.log... / [723/1.7k objects] 43% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-dnv9p_describe.log... / [724/1.7k objects] 43% Done / [725/1.7k objects] 43% Done / [726/1.7k objects] 43% Done / [727/1.7k objects] 43% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-cmgmb_describe.log... / [728/1.7k objects] 43% Done / [729/1.7k objects] 43% Done / [730/1.7k objects] 43% Done / [731/1.7k objects] 44% Done / [732/1.7k objects] 44% Done / [733/1.7k objects] 44% Done / [734/1.7k objects] 44% Done / [735/1.7k objects] 44% Done / [736/1.7k objects] 44% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-dnv9p-compliance.log... / [737/1.7k objects] 44% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-dnv9p-node-inventory.log... / [738/1.7k objects] 44% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-nhmnm-collector.log... / [739/1.7k objects] 44% Done / [740/1.7k objects] 44% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-nhmnm-node-inventory.log... / [741/1.7k objects] 44% Done / [742/1.7k objects] 44% Done / [743/1.7k objects] 44% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-nhmnm-compliance.log... / [744/1.7k objects] 44% Done / [745/1.7k objects] 44% Done / [746/1.7k objects] 44% Done / [747/1.7k objects] 44% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-nhmnm-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-pj5kz-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-pj5kz-collector.log... / [748/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-nhmnm_describe.log... / [749/1.7k objects] 45% Done / [750/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-pj5kz-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-pj5kz_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-s9bvx-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-s9bvx_describe.log... / [751/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-pj5kz-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-v2g62-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-s9bvx-node-inventory.log... / [752/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-s9bvx-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-v2g62-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-s9bvx-collector.log... / [753/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-v2g62-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-v2g62-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-v2g62_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/config-controller-5f68659754-56qpc-manager.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/config-controller-5f68659754-56qpc_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/scanner-7487f9cbb8-mchmc-scanner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42-db.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/scanner-7487f9cbb8-mchmc_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42-init-db.log... / [754/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/sensor-7b4784c4d5-r7xsl-init-tls-certs.log... / [755/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42_describe.log... / [756/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/sensor-7b4784c4d5-r7xsl-crs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/sensor-7b4784c4d5-r7xsl_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/sensor-7b4784c4d5-r7xsl-sensor.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/webhookserver-84f798856c-55slf-webhookserver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/admission-control-dockercfg-p8bhn_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/pods/webhookserver-84f798856c-55slf_describe.log... / [757/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/admission-control-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/builder-dockercfg-df9sv_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-admin-pass_describe.log... / [758/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-db-dockercfg-75lrj_describe.log... / [759/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-db-password_describe.log... / [760/1.7k objects] 45% Done / [761/1.7k objects] 45% Done / [762/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-db-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-default-tls-secret_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-dockercfg-vfb6p_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-htpasswd_describe.log... / [763/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-monitoring-tls_describe.log... / [764/1.7k objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-stackrox-central-services-proxy-env_describe.log... / [765/1.7k objects] 46% Done / [766/1.7k objects] 46% Done / [767/1.7k objects] 46% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-tls_describe.log... / [768/1.7k objects] 46% Done / [769/1.7k objects] 46% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/collector-dockercfg-npd4p_describe.log... / [770/1.7k objects] 46% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/collector-tls_describe.log... / [771/1.7k objects] 46% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/config-controller-dockercfg-c7wx7_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/default-dockercfg-g7xzt_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/deployer-dockercfg-n4tck_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/helm-cluster-config_describe.log... / [772/1.7k objects] 46% Done / [773/1.7k objects] 46% Done / [774/1.7k objects] 46% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/scanner-db-password_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/scanner-db-tls_describe.log... / [775/1.7k objects] 46% Done / [776/1.7k objects] 46% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/scanner-dockercfg-lvf9z_describe.log... / [777/1.7k objects] 46% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/scanner-tls_describe.log... / [778/1.7k objects] 46% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/securedcluster-stackrox-secured-cluster-services-proxy-env_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/sensor-dockercfg-jr4kf_describe.log... / [779/1.7k objects] 46% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/sensor-monitoring-tls_describe.log... / [780/1.7k objects] 46% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/sensor-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/service-ca_describe.log... / [781/1.7k objects] 47% Done / [782/1.7k objects] 47% Done / [783/1.7k objects] 47% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/sh.helm.release.v1.stackrox-central-services.v1_describe.log... / [784/1.7k objects] 47% Done / [785/1.7k objects] 47% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/sh.helm.release.v1.stackrox-secured-cluster-services.v1_describe.log... / [786/1.7k objects] 47% Done / [787/1.7k objects] 47% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/sh.helm.release.v1.webhookserver.v1_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-admission-control_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-collector_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-scanner-db_describe.log... / [788/1.7k objects] 47% Done / [789/1.7k objects] 47% Done / [790/1.7k objects] 47% Done / [791/1.7k objects] 47% Done / [792/1.7k objects] 47% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-scanner-v4-indexer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-scanner-v4-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/webhook-server-certs_describe.log... / [793/1.7k objects] 47% Done / [794/1.7k objects] 47% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/admission-control_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/securedclusters/stackrox-secured-cluster-services_describe.log... / [795/1.7k objects] 47% Done / [796/1.7k objects] 47% Done / [797/1.7k objects] 47% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/central-db_describe.log... / [798/1.7k objects] 48% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/central_describe.log... / [799/1.7k objects] 48% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/collector_describe.log... / [800/1.7k objects] 48% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/config-controller_describe.log... / [801/1.7k objects] 48% Done / [802/1.7k objects] 48% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/default_describe.log... / [803/1.7k objects] 48% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/deployer_describe.log... / [804/1.7k objects] 48% Done / [805/1.7k objects] 48% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/services/admission-control_describe.log... / [806/1.7k objects] 48% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/services/central-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/services/central-loadbalancer_describe.log... / [807/1.7k objects] 48% Done / [808/1.7k objects] 48% Done / [809/1.7k objects] 48% Done / [810/1.7k objects] 48% Done / [811/1.7k objects] 48% Done / [812/1.7k objects] 48% Done / [813/1.7k objects] 48% Done / [814/1.7k objects] 49% Done / [815/1.7k objects] 49% Done / [816/1.7k objects] 49% Done / [817/1.7k objects] 49% Done / [818/1.7k objects] 49% Done / [819/1.7k objects] 49% Done / [820/1.7k objects] 49% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/services/sensor-webhook_describe.log... / [821/1.7k objects] 49% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/services/scanner-db_describe.log... / [822/1.7k objects] 49% Done / [823/1.7k objects] 49% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [824/1.7k objects] 49% Done / [825/1.7k objects] 49% Done / [826/1.7k objects] 49% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/services/central_describe.log... / [827/1.7k objects] 49% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/services/scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/services/sensor_describe.log... / [828/1.7k objects] 49% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/services/webhookserver_describe.log... / [829/1.7k objects] 49% Done / [830/1.7k objects] 49% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... / [831/1.7k objects] 50% Done / [832/1.7k objects] 50% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... / [833/1.7k objects] 50% Done / [834/1.7k objects] 50% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [835/1.7k objects] 50% Done / [836/1.7k objects] 50% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... / [837/1.7k objects] 50% Done / [838/1.7k objects] 50% Done / [839/1.7k objects] 50% Done / [840/1.7k objects] 50% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/nodes/ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/stackrox_describe.log... / [841/1.7k objects] 50% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/nodes/ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/nodes/ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/secrets/default-dockercfg-jdzpj_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/serviceaccounts/builder_describe.log... / [842/1.7k objects] 50% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/secrets/deployer-dockercfg-57xth_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/secrets/builder-dockercfg-2n29b_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/serviceaccounts/default_describe.log... / [843/1.7k objects] 50% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/services/kubernetes_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/services/openshift_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [844/1.7k objects] 50% Done / [845/1.7k objects] 50% Done / [846/1.7k objects] 50% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [847/1.7k objects] 50% Done / [848/1.7k objects] 51% Done / [849/1.7k objects] 51% Done / [850/1.7k objects] 51% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [851/1.7k objects] 51% Done / [852/1.7k objects] 51% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/default/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/infrastructure/kube-apiserver.log... / [853/1.7k objects] 51% Done / [854/1.7k objects] 51% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... / [855/1.7k objects] 51% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/nodes/ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/nodes/ip-10-0-40-239.ec2.internal_describe.log... / [856/1.7k objects] 51% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/nodes/ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/nodes/ip-10-0-7-77.ec2.internal_describe.log... / [857/1.7k objects] 51% Done / [858/1.7k objects] 51% Done / [859/1.7k objects] 51% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/attachdetach-controller-dockercfg-zvdml_describe.log... / [860/1.7k objects] 51% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/aws-cloud-provider-dockercfg-llnl8_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/aws-creds_describe.log... / [861/1.7k objects] 51% Done / [862/1.7k objects] 51% Done / [863/1.7k objects] 51% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/builder-dockercfg-5rr4n_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/certificate-controller-dockercfg-4ts9j_describe.log... / [864/1.7k objects] 52% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/cloud-controller-manager-dockercfg-vcvql_describe.log... / [865/1.7k objects] 52% Done / [866/1.7k objects] 52% Done / [867/1.7k objects] 52% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/clusterrole-aggregation-controller-dockercfg-2d25d_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/daemon-set-controller-dockercfg-7rmq8_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/default-dockercfg-tqc2v_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/cronjob-controller-dockercfg-bwfcs_describe.log... / [868/1.7k objects] 52% Done / [869/1.7k objects] 52% Done / [870/1.7k objects] 52% Done / [871/1.7k objects] 52% Done / [872/1.7k objects] 52% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/deployer-dockercfg-5j8f4_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/deployment-controller-dockercfg-7zlhp_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/disruption-controller-dockercfg-k4jbk_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/endpoint-controller-dockercfg-hsjvf_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/endpointslice-controller-dockercfg-ckxq9_describe.log... / [873/1.7k objects] 52% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/endpointslicemirroring-controller-dockercfg-78tkf_describe.log... / [874/1.7k objects] 52% Done / [875/1.7k objects] 52% Done / [876/1.7k objects] 52% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/ephemeral-volume-controller-dockercfg-pj977_describe.log... / [877/1.7k objects] 52% Done / [878/1.7k objects] 52% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/expand-controller-dockercfg-c7q6p_describe.log... / [879/1.7k objects] 52% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/horizontal-pod-autoscaler-dockercfg-jxc9l_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/job-controller-dockercfg-6ggtw_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/generic-garbage-collector-dockercfg-k4nd7_describe.log... / [880/1.7k objects] 52% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/kube-cloud-cfg_describe.log... / [881/1.7k objects] 53% Done / [882/1.7k objects] 53% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/kubeadmin_describe.log... / [883/1.7k objects] 53% Done / [884/1.7k objects] 53% Done / [885/1.7k objects] 53% Done / [886/1.7k objects] 53% Done / [887/1.7k objects] 53% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/legacy-service-account-token-cleaner-dockercfg-4nmmn_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/namespace-controller-dockercfg-8fvgf_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/persistent-volume-binder-dockercfg-cdn7t_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/node-controller-dockercfg-knp2g_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/pv-protection-controller-dockercfg-csndt_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/pod-garbage-collector-dockercfg-btkfm_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/pvc-protection-controller-dockercfg-44w8f_describe.log... / [888/1.7k objects] 53% Done / [889/1.7k objects] 53% Done / [890/1.7k objects] 53% Done / [891/1.7k objects] 53% Done / [892/1.7k objects] 53% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/replicaset-controller-dockercfg-lrfp5_describe.log... / [893/1.7k objects] 53% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/replication-controller-dockercfg-z7j2d_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/resourcequota-controller-dockercfg-xlkzs_describe.log... / [894/1.7k objects] 53% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/root-ca-cert-publisher-dockercfg-v6666_describe.log... / [895/1.7k objects] 53% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/selinux-warning-controller-dockercfg-jh2l9_describe.log... / [896/1.7k objects] 53% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/service-account-controller-dockercfg-w88mk_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/service-ca-cert-publisher-dockercfg-p6bbk_describe.log... / [897/1.7k objects] 54% Done / [898/1.7k objects] 54% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/service-cidrs-controller-dockercfg-zjjhc_describe.log... / [899/1.7k objects] 54% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/statefulset-controller-dockercfg-g78jw_describe.log... / [900/1.7k objects] 54% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/service-controller-dockercfg-dqxjf_describe.log... / [901/1.7k objects] 54% Done / [902/1.7k objects] 54% Done / [903/1.7k objects] 54% Done / [904/1.7k objects] 54% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/ttl-after-finished-controller-dockercfg-x8msd_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/validatingadmissionpolicy-status-controller-dockercfg-f5l8m_describe.log... / [905/1.7k objects] 54% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/secrets/volumeattributesclass-protection-controller-dockercfg-z8c9t_describe.log... / [906/1.7k objects] 54% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/certificate-controller_describe.log... / [907/1.7k objects] 54% Done / [908/1.7k objects] 54% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/aws-cloud-provider_describe.log... / [909/1.7k objects] 54% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/attachdetach-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/builder_describe.log... / [910/1.7k objects] 54% Done / [911/1.7k objects] 54% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/clusterrole-aggregation-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/cloud-controller-manager_describe.log... / [912/1.7k objects] 54% Done / [913/1.7k objects] 54% Done / [914/1.7k objects] 55% Done / [915/1.7k objects] 55% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/cronjob-controller_describe.log... / [916/1.7k objects] 55% Done / [917/1.7k objects] 55% Done / [918/1.7k objects] 55% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/default_describe.log... / [919/1.7k objects] 55% Done / [920/1.7k objects] 55% Done / [921/1.7k objects] 55% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/endpointslicemirroring-controller_describe.log... / [922/1.7k objects] 55% Done / [923/1.7k objects] 55% Done / [924/1.7k objects] 55% Done / [925/1.7k objects] 55% Done / [926/1.7k objects] 55% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/daemon-set-controller_describe.log... / [927/1.7k objects] 55% Done / [928/1.7k objects] 55% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/endpointslice-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/deployment-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/disruption-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/endpoint-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/ephemeral-volume-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/generic-garbage-collector_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/horizontal-pod-autoscaler_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/expand-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/legacy-service-account-token-cleaner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/job-controller_describe.log... / [929/1.7k objects] 55% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/namespace-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/node-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/persistent-volume-binder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/pv-protection-controller_describe.log... / [930/1.7k objects] 55% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/pvc-protection-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/pod-garbage-collector_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/replicaset-controller_describe.log... / [931/1.7k objects] 56% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/replication-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/resourcequota-controller_describe.log... / [932/1.7k objects] 56% Done / [933/1.7k objects] 56% Done / [934/1.7k objects] 56% Done / [935/1.7k objects] 56% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/selinux-warning-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/root-ca-cert-publisher_describe.log... / [936/1.7k objects] 56% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/service-account-controller_describe.log... / [937/1.7k objects] 56% Done / [938/1.7k objects] 56% Done / [939/1.7k objects] 56% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/service-ca-cert-publisher_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/service-cidrs-controller_describe.log... / [940/1.7k objects] 56% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/statefulset-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/service-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/ttl-after-finished-controller_describe.log... / [941/1.7k objects] 56% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/validatingadmissionpolicy-status-controller_describe.log... / [942/1.7k objects] 56% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/serviceaccounts/volumeattributesclass-protection-controller_describe.log... / [943/1.7k objects] 56% Done / [944/1.7k objects] 56% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/services/kubelet_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... / [945/1.7k objects] 56% Done / [946/1.7k objects] 56% Done / [947/1.7k objects] 57% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... / [948/1.7k objects] 57% Done / [949/1.7k objects] 57% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [950/1.7k objects] 57% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [951/1.7k objects] 57% Done / [952/1.7k objects] 57% Done / [953/1.7k objects] 57% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/kube-system/validatingwebhookconfigurations/stackrox_describe.log... / [954/1.7k objects] 57% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/must-gather.local.8393972353396086030/quay-io-openshift-release-dev-ocp-v4-0-art-dev-sha256-db9c9606365c344966d73b2bf801fc7b47819160e8ec76d8d25ce5cd113f90dc/audit_logs/monitoring/metrics-server-5db665f975-57n6s/audit.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/must-gather.local.8393972353396086030/quay-io-openshift-release-dev-ocp-v4-0-art-dev-sha256-db9c9606365c344966d73b2bf801fc7b47819160e8ec76d8d25ce5cd113f90dc/audit_logs/monitoring/metrics-server-5db665f975-g9kcp/audit.log... / [955/1.7k objects] 57% Done / [956/1.7k objects] 57% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/deployments/apiserver_describe.log... / [957/1.7k objects] 57% Done / [958/1.7k objects] 57% Done / [959/1.7k objects] 57% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [960/1.7k objects] 57% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/nodes/ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/nodes/ip-10-0-28-116.ec2.internal_describe.log... / [961/1.7k objects] 57% Done / [962/1.7k objects] 57% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/nodes/ip-10-0-52-51.ec2.internal_describe.log... / [963/1.7k objects] 57% Done / [964/1.7k objects] 58% Done / [965/1.7k objects] 58% Done / [966/1.7k objects] 58% Done / [967/1.7k objects] 58% Done / [968/1.7k objects] 58% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/nodes/ip-10-0-7-77.ec2.internal_describe.log... / [969/1.7k objects] 58% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-24s6x-openshift-apiserver.log... / [970/1.7k objects] 58% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-24s6x-openshift-apiserver-check-endpoints.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-24s6x_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-66628-openshift-apiserver-check-endpoints.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-66628-openshift-apiserver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-66628_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-dqbkk-openshift-apiserver-check-endpoints.log... / [971/1.7k objects] 58% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-dqbkk-openshift-apiserver.log... / [972/1.7k objects] 58% Done / [973/1.7k objects] 58% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/pods/apiserver-65db4b4787-dqbkk_describe.log... / [974/1.7k objects] 58% Done / [975/1.7k objects] 58% Done / [976/1.7k objects] 58% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/secrets/builder-dockercfg-vhrn6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/secrets/default-dockercfg-ghcts_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/secrets/deployer-dockercfg-gptsd_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/secrets/etcd-client_describe.log... / [977/1.7k objects] 58% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/secrets/openshift-apiserver-sa-dockercfg-v8mlz_describe.log... / [978/1.7k objects] 58% Done / [979/1.7k objects] 58% Done / [980/1.7k objects] 59% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/secrets/serving-cert_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/serviceaccounts/default_describe.log... / [981/1.7k objects] 59% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/serviceaccounts/deployer_describe.log... / [982/1.7k objects] 59% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/serviceaccounts/openshift-apiserver-sa_describe.log... / [983/1.7k objects] 59% Done / [984/1.7k objects] 59% Done / [985/1.7k objects] 59% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/services/api_describe.log... / [986/1.7k objects] 59% Done / [987/1.7k objects] 59% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/services/check-endpoints_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... / [988/1.7k objects] 59% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/machine-api_describe.log... / [989/1.7k objects] 59% Done / [990/1.7k objects] 59% Done / [991/1.7k objects] 59% Done / [992/1.7k objects] 59% Done / [993/1.7k objects] 59% Done / [994/1.7k objects] 59% Done / [995/1.7k objects] 59% Done / [996/1.7k objects] 59% Done / [997/1.7k objects] 60% Done / [998/1.7k objects] 60% Done / [999/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 60% Done / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 61% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/nodes/ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/pods/oauth-openshift-86f58ccd9-rfb7j_describe.log... / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 61% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/nodes/ip-10-0-72-187.ec2.internal_describe.log... / [1.0k/1.7k objects] 61% Done / [1.0k/1.7k objects] 62% Done / [1.0k/1.7k objects] 62% Done / [1.0k/1.7k objects] 62% Done / [1.0k/1.7k objects] 62% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [1.0k/1.7k objects] 62% Done / [1.0k/1.7k objects] 62% Done / [1.0k/1.7k objects] 62% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [1.0k/1.7k objects] 62% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/pods/oauth-openshift-86f58ccd9-cm656-oauth-openshift.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/pods/oauth-openshift-86f58ccd9-2mr7g-oauth-openshift.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/secrets/builder-dockercfg-v8zqj_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/stackrox_describe.log... / [1.0k/1.7k objects] 62% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/nodes/ip-10-0-7-77.ec2.internal_describe.log... / [1.0k/1.7k objects] 62% Done / [1.0k/1.7k objects] 62% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/nodes/ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/pods/oauth-openshift-86f58ccd9-cm656_describe.log... / [1.0k/1.7k objects] 62% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/deployments/oauth-openshift_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/secrets/default-dockercfg-vxdd4_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/secrets/v4-0-config-system-session_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/pods/oauth-openshift-86f58ccd9-rfb7j-oauth-openshift.log... / [1.0k/1.7k objects] 62% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/serviceaccounts/oauth-openshift_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/secrets/v4-0-config-system-router-certs_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/pods/oauth-openshift-86f58ccd9-2mr7g_describe.log... / [1.0k/1.7k objects] 62% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/secrets/v4-0-config-system-serving-cert_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/secrets/deployer-dockercfg-dznrg_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/secrets/v4-0-config-system-ocp-branding-template_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/secrets/oauth-openshift-dockercfg-7vr7j_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/services/oauth-openshift_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... / [1.0k/1.7k objects] 62% Done / [1.0k/1.7k objects] 62% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [1.0k/1.7k objects] 62% Done / [1.0k/1.7k objects] 63% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-authentication/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/nodes/ip-10-0-28-116.ec2.internal_describe.log... / [1.0k/1.7k objects] 63% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/deployments/controller-manager_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/nodes/ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/nodes/ip-10-0-40-239.ec2.internal_describe.log... / [1.0k/1.7k objects] 63% Done / [1.1k/1.7k objects] 63% Done / [1.1k/1.7k objects] 63% Done / [1.1k/1.7k objects] 63% Done / [1.1k/1.7k objects] 63% Done / [1.1k/1.7k objects] 63% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/nodes/ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/pods/controller-manager-5d7d85d87d-7cs4c_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/pods/controller-manager-5d7d85d87d-7cs4c-controller-manager.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/pods/controller-manager-5d7d85d87d-b8b4t-controller-manager.log... / [1.1k/1.7k objects] 63% Done / [1.1k/1.7k objects] 63% Done / [1.1k/1.7k objects] 63% Done / [1.1k/1.7k objects] 63% Done / [1.1k/1.7k objects] 63% Done / [1.1k/1.7k objects] 63% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/pods/controller-manager-5d7d85d87d-c44qj-controller-manager.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/secrets/builder-dockercfg-ddf6h_describe.log... / [1.1k/1.7k objects] 63% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/pods/controller-manager-5d7d85d87d-b8b4t_describe.log... / [1.1k/1.7k objects] 63% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/pods/controller-manager-5d7d85d87d-c44qj_describe.log... / [1.1k/1.7k objects] 63% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/secrets/default-dockercfg-v29nc_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/secrets/deployer-dockercfg-sd6hg_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/secrets/serving-cert_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/secrets/openshift-controller-manager-sa-dockercfg-s528s_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/serviceaccounts/openshift-controller-manager-sa_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/services/controller-manager_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... / [1.1k/1.7k objects] 64% Done / [1.1k/1.7k objects] 64% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [1.1k/1.7k objects] 64% Done / [1.1k/1.7k objects] 64% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/stackrox_describe.log... / [1.1k/1.7k objects] 64% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... / [1.1k/1.7k objects] 64% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/daemonsets/dns-default_describe.log... / [1.1k/1.7k objects] 64% Done / [1.1k/1.7k objects] 64% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/daemonsets/node-resolver_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [1.1k/1.7k objects] 64% Done / [1.1k/1.7k objects] 64% Done / [1.1k/1.7k objects] 64% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/nodes/ip-10-0-28-116.ec2.internal_describe.log... / [1.1k/1.7k objects] 64% Done / [1.1k/1.7k objects] 64% Done / [1.1k/1.7k objects] 64% Done / [1.1k/1.7k objects] 64% Done / [1.1k/1.7k objects] 64% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/nodes/ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/nodes/ip-10-0-40-239.ec2.internal_describe.log... / [1.1k/1.7k objects] 65% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/nodes/ip-10-0-72-187.ec2.internal_describe.log... / [1.1k/1.7k objects] 65% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-5g8pg-dns.log... / [1.1k/1.7k objects] 65% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-5g8pg-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-5g8pg_describe.log... / [1.1k/1.7k objects] 65% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-7xm8x-dns.log... / [1.1k/1.7k objects] 65% Done / [1.1k/1.7k objects] 65% Done / [1.1k/1.7k objects] 65% Done / [1.1k/1.7k objects] 65% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-7xm8x-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-ncbxz-dns.log... / [1.1k/1.7k objects] 65% Done / [1.1k/1.7k objects] 65% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-nttfc-dns.log... / [1.1k/1.7k objects] 65% Done / [1.1k/1.7k objects] 65% Done / [1.1k/1.7k objects] 65% Done / [1.1k/1.7k objects] 65% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-ncbxz_describe.log... / [1.1k/1.7k objects] 65% Done / [1.1k/1.7k objects] 65% Done / [1.1k/1.7k objects] 65% Done / [1.1k/1.7k objects] 66% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-7xm8x_describe.log... / [1.1k/1.7k objects] 66% Done / [1.1k/1.7k objects] 66% Done / [1.1k/1.7k objects] 66% Done / [1.1k/1.7k objects] 66% Done / [1.1k/1.7k objects] 66% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-nttfc-kube-rbac-proxy.log... / [1.1k/1.7k objects] 66% Done / [1.1k/1.7k objects] 66% Done / [1.1k/1.7k objects] 66% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-ncbxz-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-qs2bx-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-nttfc_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-qs2bx-dns.log... / [1.1k/1.7k objects] 66% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-wkz9f_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-qs2bx_describe.log... / [1.1k/1.7k objects] 66% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-wkz9f-dns.log... / [1.1k/1.7k objects] 66% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/dns-default-wkz9f-kube-rbac-proxy.log... / [1.1k/1.7k objects] 66% Done / [1.1k/1.7k objects] 66% Done / [1.1k/1.7k objects] 66% Done / [1.1k/1.7k objects] 66% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/node-resolver-2zg7g-dns-node-resolver.log... / [1.1k/1.7k objects] 67% Done / [1.1k/1.7k objects] 67% Done / [1.1k/1.7k objects] 67% Done / [1.1k/1.7k objects] 67% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/node-resolver-2kkpw-dns-node-resolver.log... / [1.1k/1.7k objects] 67% Done / [1.1k/1.7k objects] 67% Done / [1.1k/1.7k objects] 67% Done / [1.1k/1.7k objects] 67% Done / [1.1k/1.7k objects] 67% Done / [1.1k/1.7k objects] 67% Done / [1.1k/1.7k objects] 67% Done / [1.1k/1.7k objects] 67% Done / [1.1k/1.7k objects] 67% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/node-resolver-2kkpw_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/node-resolver-2zg7g_describe.log... / [1.1k/1.7k objects] 67% Done / [1.1k/1.7k objects] 67% Done / [1.1k/1.7k objects] 67% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/node-resolver-pdnsn-dns-node-resolver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/node-resolver-ctldt_describe.log... / [1.1k/1.7k objects] 67% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/node-resolver-4khpf-dns-node-resolver.log... / [1.1k/1.7k objects] 68% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/node-resolver-ctldt-dns-node-resolver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/node-resolver-4khpf_describe.log... / [1.1k/1.7k objects] 68% Done / [1.1k/1.7k objects] 68% Done / [1.1k/1.7k objects] 68% Done / [1.1k/1.7k objects] 68% Done / [1.1k/1.7k objects] 68% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/node-resolver-sh6p8-dns-node-resolver.log... / [1.1k/1.7k objects] 68% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/node-resolver-pdnsn_describe.log... / [1.1k/1.7k objects] 68% Done / [1.1k/1.7k objects] 68% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/pods/node-resolver-sh6p8_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/secrets/builder-dockercfg-mn5dk_describe.log... / [1.1k/1.7k objects] 68% Done / [1.1k/1.7k objects] 68% Done / [1.1k/1.7k objects] 68% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/secrets/node-resolver-dockercfg-kp4t8_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/secrets/dns-dockercfg-p8lt7_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/serviceaccounts/default_describe.log... / [1.1k/1.7k objects] 68% Done / [1.1k/1.7k objects] 68% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/secrets/deployer-dockercfg-74sjc_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/secrets/default-dockercfg-cg7v9_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/secrets/dns-default-metrics-tls_describe.log... / [1.1k/1.7k objects] 68% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... / [1.1k/1.7k objects] 68% Done / [1.1k/1.7k objects] 68% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/serviceaccounts/dns_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... / [1.1k/1.7k objects] 69% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/serviceaccounts/node-resolver_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/services/dns-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-dns/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/nodes/ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/nodes/ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/nodes/ip-10-0-40-239.ec2.internal_describe.log... / [1.1k/1.7k objects] 69% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-guard-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-guard-ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-119-203.ec2.internal-etcd-readyz.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-119-203.ec2.internal-etcd-metrics.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-guard-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-119-203.ec2.internal-etcd-rev.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-119-203.ec2.internal-etcd.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-40-239.ec2.internal-etcd-metrics.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-119-203.ec2.internal-setup.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-40-239.ec2.internal-etcd-readyz.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-40-239.ec2.internal-etcd-rev.log... / [1.1k/1.7k objects] 69% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-40-239.ec2.internal-etcd.log... / [1.1k/1.7k objects] 69% Done / [1.2k/1.7k objects] 69% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-40-239.ec2.internal-setup.log... / [1.2k/1.7k objects] 69% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-52-51.ec2.internal-etcd-metrics.log... / [1.2k/1.7k objects] 69% Done / [1.2k/1.7k objects] 69% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-52-51.ec2.internal-etcd-readyz.log... / [1.2k/1.7k objects] 69% Done / [1.2k/1.7k objects] 69% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-52-51.ec2.internal-etcd-rev.log... / [1.2k/1.7k objects] 69% Done / [1.2k/1.7k objects] 69% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-52-51.ec2.internal-etcd.log... / [1.2k/1.7k objects] 69% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-52-51.ec2.internal-setup.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-5-ip-10-0-40-239.ec2.internal-installer.log... / [1.2k/1.7k objects] 69% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-5-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-5-ip-10-0-52-51.ec2.internal-installer.log... / [1.2k/1.7k objects] 69% Done / [1.2k/1.7k objects] 69% Done / [1.2k/1.7k objects] 70% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-5-ip-10-0-52-51.ec2.internal_describe.log... / [1.2k/1.7k objects] 70% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-119-203.ec2.internal-installer.log... / [1.2k/1.7k objects] 70% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-119-203.ec2.internal_describe.log... / [1.2k/1.7k objects] 70% Done / [1.2k/1.7k objects] 70% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-40-239.ec2.internal-installer.log... / [1.2k/1.7k objects] 70% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-52-51.ec2.internal-installer.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-119-203.ec2.internal-installer.log... / [1.2k/1.7k objects] 70% Done / [1.2k/1.7k objects] 70% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-119-203.ec2.internal_describe.log... / [1.2k/1.7k objects] 70% Done / [1.2k/1.7k objects] 70% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-40-239.ec2.internal-installer.log... / [1.2k/1.7k objects] 70% Done / [1.2k/1.7k objects] 70% Done / [1.2k/1.7k objects] 70% Done / [1.2k/1.7k objects] 70% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-52-51.ec2.internal-installer.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-119-203.ec2.internal-pruner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-119-203.ec2.internal_describe.log... / [1.2k/1.7k objects] 70% Done / [1.2k/1.7k objects] 70% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-40-239.ec2.internal-pruner.log... / [1.2k/1.7k objects] 70% Done / [1.2k/1.7k objects] 71% Done / [1.2k/1.7k objects] 71% Done / [1.2k/1.7k objects] 71% Done / [1.2k/1.7k objects] 71% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-52-51.ec2.internal-pruner.log... / [1.2k/1.7k objects] 71% Done / [1.2k/1.7k objects] 71% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-40-239.ec2.internal-pruner.log... / [1.2k/1.7k objects] 71% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-119-203.ec2.internal-pruner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-40-239.ec2.internal_describe.log... / [1.2k/1.7k objects] 71% Done / [1.2k/1.7k objects] 71% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/builder-dockercfg-jlctz_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-52-51.ec2.internal-pruner.log... / [1.2k/1.7k objects] 71% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/default-dockercfg-p8x5v_describe.log... / [1.2k/1.7k objects] 71% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/deployer-dockercfg-lxvxc_describe.log... / [1.2k/1.7k objects] 71% Done / [1.2k/1.7k objects] 71% Done / [1.2k/1.7k objects] 71% Done / [1.2k/1.7k objects] 71% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-all-certs-4_describe.log... / [1.2k/1.7k objects] 71% Done / [1.2k/1.7k objects] 72% Done / [1.2k/1.7k objects] 72% Done / [1.2k/1.7k objects] 72% Done / [1.2k/1.7k objects] 72% Done / [1.2k/1.7k objects] 72% Done / [1.2k/1.7k objects] 72% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-all-certs-7_describe.log... / [1.2k/1.7k objects] 72% Done / [1.2k/1.7k objects] 72% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-all-certs-5_describe.log... / [1.2k/1.7k objects] 72% Done / [1.2k/1.7k objects] 72% Done / [1.2k/1.7k objects] 72% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-backup-sa-dockercfg-5rhbv_describe.log... / [1.2k/1.7k objects] 72% Done / [1.2k/1.7k objects] 72% Done / [1.2k/1.7k objects] 72% Done / [1.2k/1.7k objects] 72% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-all-certs_describe.log... / [1.2k/1.7k objects] 72% Done / [1.2k/1.7k objects] 72% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-all-certs-6_describe.log... / [1.2k/1.7k objects] 73% Done / [1.2k/1.7k objects] 73% Done / [1.2k/1.7k objects] 73% Done / [1.2k/1.7k objects] 73% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-all-certs-8_describe.log... / [1.2k/1.7k objects] 73% Done / [1.2k/1.7k objects] 73% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-metric-signer_describe.log... / [1.2k/1.7k objects] 73% Done / [1.2k/1.7k objects] 73% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-client_describe.log... / [1.2k/1.7k objects] 73% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-peer-ip-10-0-40-239.ec2.internal_describe.log... / [1.2k/1.7k objects] 73% Done / [1.2k/1.7k objects] 73% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-metric-client_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-peer-ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-peer-ip-10-0-145-168_describe.log... / [1.2k/1.7k objects] 73% Done / [1.2k/1.7k objects] 73% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-sa-dockercfg-gfmkj_describe.log... / [1.2k/1.7k objects] 73% Done / [1.2k/1.7k objects] 73% Done / [1.2k/1.7k objects] 73% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-peer-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-serving-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-serving-ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-serving-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-serving-ip-10-0-145-168_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-serving-metrics-ip-10-0-145-168_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/installer-sa-dockercfg-hrqr5_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-serving-metrics-ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/serving-cert_describe.log... / [1.2k/1.7k objects] 73% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-serving-metrics-ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-serving-metrics-ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/secrets/etcd-signer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/serviceaccounts/etcd-backup-sa_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/serviceaccounts/etcd-sa_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/serviceaccounts/installer-sa_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/services/etcd_describe.log... / [1.2k/1.7k objects] 74% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [1.2k/1.7k objects] 74% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [1.2k/1.7k objects] 74% Done / [1.2k/1.7k objects] 74% Done / [1.2k/1.7k objects] 74% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-etcd/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/deployments/router-default_describe.log... / [1.2k/1.7k objects] 74% Done / [1.2k/1.7k objects] 74% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/nodes/ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/nodes/ip-10-0-28-116.ec2.internal_describe.log... / [1.2k/1.7k objects] 74% Done / [1.2k/1.7k objects] 74% Done / [1.2k/1.7k objects] 74% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/nodes/ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/nodes/ip-10-0-52-51.ec2.internal_describe.log... / [1.2k/1.7k objects] 74% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/nodes/ip-10-0-7-77.ec2.internal_describe.log... / [1.2k/1.7k objects] 74% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/pods/router-default-5c65bb8759-k9k7w-router.log... / [1.2k/1.7k objects] 74% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/pods/router-default-5c65bb8759-k9k7w_describe.log... / [1.2k/1.7k objects] 74% Done / [1.2k/1.7k objects] 74% Done / [1.2k/1.7k objects] 74% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/pods/router-default-5c65bb8759-z9czs-router.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/pods/router-default-5c65bb8759-z9czs_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/secrets/builder-dockercfg-6kd7x_describe.log... / [1.2k/1.7k objects] 75% Done / [1.2k/1.7k objects] 75% Done / [1.2k/1.7k objects] 75% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/secrets/default-dockercfg-nqzj6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/secrets/deployer-dockercfg-fwwnj_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/secrets/router-certs-default_describe.log... / [1.2k/1.7k objects] 75% Done / [1.2k/1.7k objects] 75% Done / [1.3k/1.7k objects] 75% Done / [1.3k/1.7k objects] 75% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/secrets/router-dockercfg-znssc_describe.log... / [1.3k/1.7k objects] 75% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/secrets/router-metrics-certs-default_describe.log... / [1.3k/1.7k objects] 75% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/secrets/router-stats-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/serviceaccounts/builder_describe.log... / [1.3k/1.7k objects] 75% Done / [1.3k/1.7k objects] 75% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/serviceaccounts/default_describe.log... / [1.3k/1.7k objects] 75% Done / [1.3k/1.7k objects] 75% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/serviceaccounts/deployer_describe.log... / [1.3k/1.7k objects] 75% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/serviceaccounts/router_describe.log... / [1.3k/1.7k objects] 75% Done / [1.3k/1.7k objects] 75% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/services/router-internal-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/services/router-default_describe.log... / [1.3k/1.7k objects] 75% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... / [1.3k/1.7k objects] 76% Done / [1.3k/1.7k objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [1.3k/1.7k objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/validatingwebhookconfigurations/machine-api_describe.log... / [1.3k/1.7k objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [1.3k/1.7k objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... / [1.3k/1.7k objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [1.3k/1.7k objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-ingress/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/catalogsources/certified-operators_describe.log... / [1.3k/1.7k objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/catalogsources/community-operators_describe.log... / [1.3k/1.7k objects] 76% Done / [1.3k/1.7k objects] 76% Done / [1.3k/1.7k objects] 76% Done / [1.3k/1.7k objects] 76% Done / [1.3k/1.7k objects] 76% Done / [1.3k/1.7k objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/catalogsources/redhat-marketplace_describe.log... / [1.3k/1.7k objects] 76% Done / [1.3k/1.7k objects] 76% Done / [1.3k/1.7k objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/catalogsources/redhat-operators_describe.log... / [1.3k/1.7k objects] 77% Done / [1.3k/1.7k objects] 77% Done / [1.3k/1.7k objects] 77% Done / [1.3k/1.7k objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... / [1.3k/1.7k objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [1.3k/1.7k objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/nodes/ip-10-0-52-51.ec2.internal_describe.log... / [1.3k/1.7k objects] 77% Done / [1.3k/1.7k objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/nodes/ip-10-0-7-77.ec2.internal_describe.log... / [1.3k/1.7k objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/deployments/marketplace-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/nodes/ip-10-0-40-239.ec2.internal_describe.log... / [1.3k/1.7k objects] 77% Done / [1.3k/1.7k objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/pods/certified-operators-p4cqh_describe.log... / [1.3k/1.7k objects] 77% Done / [1.3k/1.7k objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/pods/community-operators-bfkhb_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/pods/certified-operators-p4cqh-registry-server.log... / [1.3k/1.7k objects] 77% Done / [1.3k/1.7k objects] 77% Done / [1.3k/1.7k objects] 77% Done / [1.3k/1.7k objects] 78% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/pods/community-operators-bfkhb-registry-server.log... / [1.3k/1.7k objects] 78% Done / [1.3k/1.7k objects] 78% Done / [1.3k/1.7k objects] 78% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/pods/marketplace-operator-59f9fd9b7-hhzg9-marketplace-operator-prev-success.log... / [1.3k/1.7k objects] 78% Done / [1.3k/1.7k objects] 78% Done / [1.3k/1.7k objects] 78% Done / [1.3k/1.7k objects] 78% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/pods/marketplace-operator-59f9fd9b7-hhzg9-marketplace-operator.log... / [1.3k/1.7k objects] 78% Done / [1.3k/1.7k objects] 78% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/pods/marketplace-operator-59f9fd9b7-hhzg9_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/pods/redhat-marketplace-b9zcc_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/pods/redhat-operators-j85mj_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/pods/redhat-marketplace-b9zcc-registry-server.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/pods/redhat-operators-j85mj-registry-server.log... / [1.3k/1.7k objects] 78% Done / [1.3k/1.7k objects] 78% Done / [1.3k/1.7k objects] 78% Done / [1.3k/1.7k objects] 78% Done / [1.3k/1.7k objects] 78% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/secrets/builder-dockercfg-clrc9_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/secrets/redhat-marketplace-dockercfg-jg892_describe.log... / [1.3k/1.7k objects] 78% Done / [1.3k/1.7k objects] 78% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/secrets/certified-operators-dockercfg-8dqpl_describe.log... / [1.3k/1.7k objects] 79% Done / [1.3k/1.7k objects] 79% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/secrets/default-dockercfg-9hdtx_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/secrets/marketplace-operator-metrics_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/secrets/community-operators-dockercfg-wgjfb_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/serviceaccounts/certified-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/secrets/deployer-dockercfg-gxd6l_describe.log... / [1.3k/1.7k objects] 79% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/secrets/marketplace-operator-dockercfg-gjpf6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/secrets/redhat-operators-dockercfg-fjnhf_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/serviceaccounts/community-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/serviceaccounts/default_describe.log... / [1.3k/1.7k objects] 79% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/serviceaccounts/redhat-marketplace_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/serviceaccounts/marketplace-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/services/certified-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/serviceaccounts/redhat-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/services/community-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/services/marketplace-operator-metrics_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/services/redhat-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/services/redhat-marketplace_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... / [1.3k/1.7k objects] 79% Done / [1.3k/1.7k objects] 79% Done / [1.3k/1.7k objects] 79% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [1.3k/1.7k objects] 79% Done / [1.3k/1.7k objects] 79% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... / [1.3k/1.7k objects] 79% Done / [1.3k/1.7k objects] 79% Done / [1.3k/1.7k objects] 79% Done / [1.3k/1.7k objects] 79% Done / [1.3k/1.7k objects] 79% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/daemonsets/qa-e2e_describe.log... / [1.3k/1.7k objects] 79% Done / [1.3k/1.7k objects] 79% Done / [1.3k/1.7k objects] 80% Done / [1.3k/1.7k objects] 80% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/deployments/qa-e2e-metrics_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/daemonsets/stackrox-images_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/deployments/stackrox-images-metrics_describe.log... / [1.3k/1.7k objects] 80% Done / [1.3k/1.7k objects] 80% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/nodes/ip-10-0-119-203.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/nodes/ip-10-0-40-239.ec2.internal_describe.log... / [1.3k/1.7k objects] 80% Done / [1.3k/1.7k objects] 80% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/nodes/ip-10-0-52-51.ec2.internal_describe.log... / [1.3k/1.7k objects] 80% Done / [1.3k/1.7k objects] 80% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/nodes/ip-10-0-72-187.ec2.internal_describe.log... / [1.3k/1.7k objects] 80% Done / [1.3k/1.7k objects] 80% Done / [1.3k/1.7k objects] 80% Done / [1.3k/1.7k objects] 80% Done / [1.3k/1.7k objects] 80% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-2k5lw-prefetch.log... / [1.3k/1.7k objects] 80% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-2k5lw-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-2k5lw_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-4s8tw-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-4s8tw-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-4s8tw_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-72nmb-prefetch.log... / [1.3k/1.7k objects] 80% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-72nmb-sleep.log... / [1.3k/1.7k objects] 80% Done / [1.3k/1.7k objects] 80% Done / [1.3k/1.7k objects] 81% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-72nmb_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-hp2qk-prefetch.log... / [1.3k/1.7k objects] 81% Done / [1.3k/1.7k objects] 81% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-hp2qk-sleep.log... / [1.3k/1.7k objects] 81% Done / [1.4k/1.7k objects] 81% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-hp2qk_describe.log... / [1.4k/1.7k objects] 81% Done / [1.4k/1.7k objects] 81% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-hwkkq-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-hwkkq-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-hwkkq_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-metrics-7fdf959548-7g84w-aggregator.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-metrics-7fdf959548-7g84w_describe.log... / [1.4k/1.7k objects] 81% Done / [1.4k/1.7k objects] 81% Done / [1.4k/1.7k objects] 81% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-wb7f5-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-wb7f5-sleep.log... / [1.4k/1.7k objects] 81% Done / [1.4k/1.7k objects] 81% Done / [1.4k/1.7k objects] 81% Done / [1.4k/1.7k objects] 81% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/qa-e2e-wb7f5_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-6rqv9-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-6rqv9-sleep.log... / [1.4k/1.7k objects] 81% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-6rqv9_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-bqn6c-prefetch.log... / [1.4k/1.7k objects] 81% Done / [1.4k/1.7k objects] 81% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-bqn6c-sleep.log... / [1.4k/1.7k objects] 82% Done / [1.4k/1.7k objects] 82% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-bqn6c_describe.log... / [1.4k/1.7k objects] 82% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-hcczx-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-hcczx-sleep.log... / [1.4k/1.7k objects] 82% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-hcczx_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-lhrlk-prefetch.log... / [1.4k/1.7k objects] 82% Done / [1.4k/1.7k objects] 82% Done / [1.4k/1.7k objects] 82% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-lhrlk-sleep.log... / [1.4k/1.7k objects] 82% Done / [1.4k/1.7k objects] 82% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-lhrlk_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-metrics-8d848757-98ctr-aggregator.log... / [1.4k/1.7k objects] 82% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-metrics-8d848757-98ctr_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-pvqkv-prefetch.log... / [1.4k/1.7k objects] 82% Done / [1.4k/1.7k objects] 82% Done / [1.4k/1.7k objects] 82% Done / [1.4k/1.7k objects] 82% Done / [1.4k/1.7k objects] 82% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-pvqkv_describe.log... / [1.4k/1.7k objects] 82% Done / [1.4k/1.7k objects] 83% Done / [1.4k/1.7k objects] 83% Done / [1.4k/1.7k objects] 83% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-xl9cv_describe.log... / [1.4k/1.7k objects] 83% Done / [1.4k/1.7k objects] 83% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-xl9cv-prefetch.log... / [1.4k/1.7k objects] 83% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-xl9cv-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/pods/stackrox-images-pvqkv-sleep.log... / [1.4k/1.7k objects] 83% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/secrets/deployer-dockercfg-c78n5_describe.log... / [1.4k/1.7k objects] 83% Done / [1.4k/1.7k objects] 83% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/secrets/stackrox_describe.log... / [1.4k/1.7k objects] 83% Done / [1.4k/1.7k objects] 83% Done / [1.4k/1.7k objects] 83% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/secrets/builder-dockercfg-tlkdx_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/secrets/default-dockercfg-4rgn5_describe.log... / [1.4k/1.7k objects] 83% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/services/qa-e2e-metrics_describe.log... / [1.4k/1.7k objects] 83% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/services/stackrox-images-metrics_describe.log... / [1.4k/1.7k objects] 83% Done / [1.4k/1.7k objects] 83% Done / [1.4k/1.7k objects] 83% Done / [1.4k/1.7k objects] 84% Done / [1.4k/1.7k objects] 84% Done / [1.4k/1.7k objects] 84% Done / [1.4k/1.7k objects] 84% Done / [1.4k/1.7k objects] 84% Done / [1.4k/1.7k objects] 84% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/validatingwebhookconfigurations/machine-api_describe.log... / [1.4k/1.7k objects] 84% Done / [1.4k/1.7k objects] 84% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... / [1.4k/1.7k objects] 84% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/catalogsources/stackrox-operator-test-index_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/prefetch-images/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/nodes/ip-10-0-52-51.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [1.4k/1.7k objects] 84% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/nodes/ip-10-0-28-116.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/deployments/rhacs-operator-controller-manager_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/nodes/ip-10-0-40-239.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/nodes/ip-10-0-7-77.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/nodes/ip-10-0-72-187.ec2.internal_describe.log... / [1.4k/1.7k objects] 84% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq-extract.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq-pull.log... / [1.4k/1.7k objects] 84% Done / [1.4k/1.7k objects] 84% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq-util.log... / [1.4k/1.7k objects] 84% Done / [1.4k/1.7k objects] 84% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/pods/rhacs-operator-controller-manager-7b9d48dc97-n6jrj-manager.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/pods/2bde9d65b17119af77aee6b228124688339cb4e3faae7d56f57a3085555ttjq_describe.log... / [1.4k/1.7k objects] 84% Done / [1.4k/1.7k objects] 85% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/pods/rhacs-operator-controller-manager-7b9d48dc97-n6jrj_describe.log... / [1.4k/1.7k objects] 85% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/pods/stackrox-operator-test-index-q698h-registry-server.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/pods/stackrox-operator-test-index-q698h_describe.log... / [1.4k/1.7k objects] 85% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/secrets/builder-dockercfg-ldfjm_describe.log... / [1.4k/1.7k objects] 85% Done / [1.4k/1.7k objects] 85% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/secrets/default-dockercfg-hk546_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/secrets/deployer-dockercfg-d5lwg_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/secrets/rhacs-operator-controller-manager-dockercfg-8tq26_describe.log... / [1.4k/1.7k objects] 85% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/secrets/stackrox-operator-test-index-dockercfg-k8tbd_describe.log... / [1.4k/1.7k objects] 85% Done / [1.4k/1.7k objects] 85% Done / [1.4k/1.7k objects] 85% Done / [1.4k/1.7k objects] 85% Done / [1.4k/1.7k objects] 85% Done / [1.4k/1.7k objects] 85% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/serviceaccounts/default_describe.log... / [1.4k/1.7k objects] 85% Done / [1.4k/1.7k objects] 85% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/serviceaccounts/rhacs-operator-controller-manager_describe.log... / [1.4k/1.7k objects] 85% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/serviceaccounts/stackrox-operator-test-index_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/subscriptions/stackrox-operator-test-subscription_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/services/stackrox-operator-test-index_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/services/rhacs-operator-controller-manager-metrics-service_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... / [1.4k/1.7k objects] 85% Done / [1.4k/1.7k objects] 85% Done / [1.4k/1.7k objects] 86% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [1.4k/1.7k objects] 86% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/validatingwebhookconfigurations/machine-api_describe.log... / [1.4k/1.7k objects] 86% Done / [1.4k/1.7k objects] 86% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [1.4k/1.7k objects] 86% Done / [1.4k/1.7k objects] 86% Done / [1.4k/1.7k objects] 86% Done / [1.4k/1.7k objects] 86% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [1.4k/1.7k objects] 86% Done / [1.4k/1.7k objects] 86% Done / [1.4k/1.7k objects] 86% Done / [1.4k/1.7k objects] 86% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox-operator/validatingwebhookconfigurations/stackrox_describe.log... / [1.4k/1.7k objects] 86% Done / [1.4k/1.7k objects] 86% Done / [1.4k/1.7k objects] 86% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/central/stackrox-central-services_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/clusterserviceversions/rhacs-operator.v4.10.0-207-g071f40eed6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/daemonsets/collector_describe.log... / [1.4k/1.7k objects] 86% Done / [1.4k/1.7k objects] 86% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/deployments/admission-control_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/deployments/central_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/deployments/config-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/deployments/central-db_describe.log... / [1.4k/1.7k objects] 87% Done / [1.4k/1.7k objects] 87% Done / [1.4k/1.7k objects] 87% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/deployments/scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/deployments/sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/deployments/scanner-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/deployments/webhookserver_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/nodes/ip-10-0-119-203.ec2.internal_describe.log... / [1.4k/1.7k objects] 87% Done / [1.4k/1.7k objects] 87% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/nodes/ip-10-0-28-116.ec2.internal_describe.log... / [1.5k/1.7k objects] 87% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/nodes/ip-10-0-40-239.ec2.internal_describe.log... / [1.5k/1.7k objects] 87% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/nodes/ip-10-0-52-51.ec2.internal_describe.log... / [1.5k/1.7k objects] 87% Done / [1.5k/1.7k objects] 87% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/nodes/ip-10-0-7-77.ec2.internal_describe.log... / [1.5k/1.7k objects] 87% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/nodes/ip-10-0-72-187.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-fsbsk-admission-control.log... / [1.5k/1.7k objects] 87% Done / [1.5k/1.7k objects] 87% Done / [1.5k/1.7k objects] 87% Done / [1.5k/1.7k objects] 87% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-k75ft-admission-control.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-fsbsk_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-fsbsk-init-tls-certs.log... / [1.5k/1.7k objects] 87% Done / [1.5k/1.7k objects] 87% Done / [1.5k/1.7k objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-k75ft_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-wp94p-admission-control.log... / [1.5k/1.7k objects] 88% Done / [1.5k/1.7k objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-wp94p-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-k75ft-init-tls-certs.log... / [1.5k/1.7k objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/admission-control-7c9bf84889-wp94p_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/central-795644c465-msqhx-central.log... / [1.5k/1.7k objects] 88% Done / [1.5k/1.7k objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/central-795644c465-msqhx_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/central-db-84b98c8889-fzcq2-central-db.log... / [1.5k/1.7k objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/central-db-84b98c8889-fzcq2-init-db.log... / [1.5k/1.7k objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/central-db-84b98c8889-fzcq2_describe.log... / [1.5k/1.7k objects] 88% Done / [1.5k/1.7k objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-cmgmb-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-cmgmb-compliance.log... / [1.5k/1.7k objects] 88% Done / [1.5k/1.7k objects] 88% Done / [1.5k/1.7k objects] 88% Done / [1.5k/1.7k objects] 88% Done / [1.5k/1.7k objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-cmgmb-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-cmgmb_describe.log... / [1.5k/1.7k objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-dnv9p-compliance.log... / [1.5k/1.7k objects] 88% Done / [1.5k/1.7k objects] 89% Done / [1.5k/1.7k objects] 89% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-dnv9p-init-tls-certs.log... / [1.5k/1.7k objects] 89% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-cmgmb-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-dnv9p-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-dnv9p-node-inventory.log... / [1.5k/1.7k objects] 89% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-nhmnm-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-dnv9p_describe.log... / [1.5k/1.7k objects] 89% Done / [1.5k/1.7k objects] 89% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-nhmnm-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-nhmnm-node-inventory.log... / [1.5k/1.7k objects] 89% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-nhmnm-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-nhmnm_describe.log... / [1.5k/1.7k objects] 89% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-pj5kz-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-pj5kz-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-pj5kz-init-tls-certs.log... / [1.5k/1.7k objects] 89% Done / [1.5k/1.7k objects] 89% Done / [1.5k/1.7k objects] 89% Done / [1.5k/1.7k objects] 89% Done / [1.5k/1.7k objects] 89% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-pj5kz-node-inventory.log... / [1.5k/1.7k objects] 89% Done / [1.5k/1.7k objects] 89% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-s9bvx-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-pj5kz_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-s9bvx-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-s9bvx-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-s9bvx-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-s9bvx_describe.log... / [1.5k/1.7k objects] 89% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-v2g62-collector.log... / [1.5k/1.7k objects] 90% Done / [1.5k/1.7k objects] 90% Done / [1.5k/1.7k objects] 90% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-v2g62-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-v2g62-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-v2g62-init-tls-certs.log... / [1.5k/1.7k objects] 90% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/collector-v2g62_describe.log... / [1.5k/1.7k objects] 90% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/config-controller-5f68659754-56qpc-manager.log... / [1.5k/1.7k objects] 90% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/config-controller-5f68659754-56qpc_describe.log... / [1.5k/1.7k objects] 90% Done / [1.5k/1.7k objects] 90% Done / [1.5k/1.7k objects] 90% Done / [1.5k/1.7k objects] 90% Done / [1.5k/1.7k objects] 90% Done / [1.5k/1.7k objects] 90% Done / [1.5k/1.7k objects] 90% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/scanner-7487f9cbb8-mchmc-scanner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/scanner-7487f9cbb8-mchmc_describe.log... / [1.5k/1.7k objects] 90% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42-init-db.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42-db.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/scanner-db-74f98cd84d-7sg42_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4-sensor.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4-crs.log... / [1.5k/1.7k objects] 90% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/sensor-7b4784c4d5-9ffg4_describe.log... / [1.5k/1.7k objects] 90% Done / [1.5k/1.7k objects] 90% Done / [1.5k/1.7k objects] 91% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/webhookserver-84f798856c-55slf-webhookserver.log... / [1.5k/1.7k objects] 91% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/pods/webhookserver-84f798856c-55slf_describe.log... / [1.5k/1.7k objects] 91% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/admission-control-dockercfg-p8bhn_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/admission-control-tls_describe.log... / [1.5k/1.7k objects] 91% Done / [1.5k/1.7k objects] 91% Done / [1.5k/1.7k objects] 91% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/builder-dockercfg-df9sv_describe.log... / [1.5k/1.7k objects] 91% Done / [1.5k/1.7k objects] 91% Done / [1.5k/1.7k objects] 91% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/central-db-dockercfg-75lrj_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/central-db-password_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/central-db-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/central-dockercfg-vfb6p_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/central-default-tls-secret_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/central-htpasswd_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/central-admin-pass_describe.log... / [1.5k/1.7k objects] 91% Done / [1.5k/1.7k objects] 91% Done / [1.5k/1.7k objects] 91% Done / [1.5k/1.7k objects] 91% Done / [1.5k/1.7k objects] 91% Done / [1.5k/1.7k objects] 91% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/central-monitoring-tls_describe.log... / [1.5k/1.7k objects] 91% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/collector-dockercfg-npd4p_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/central-stackrox-central-services-proxy-env_describe.log... / [1.5k/1.7k objects] 91% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/collector-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/central-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/config-controller-dockercfg-c7wx7_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/deployer-dockercfg-n4tck_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/default-dockercfg-g7xzt_describe.log... / [1.5k/1.7k objects] 92% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/helm-cluster-config_describe.log... / [1.5k/1.7k objects] 92% Done / [1.5k/1.7k objects] 92% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/scanner-db-password_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/scanner-db-tls_describe.log... / [1.5k/1.7k objects] 92% Done / [1.5k/1.7k objects] 92% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/scanner-dockercfg-lvf9z_describe.log... / [1.5k/1.7k objects] 92% Done / [1.5k/1.7k objects] 92% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/scanner-tls_describe.log... / [1.5k/1.7k objects] 92% Done / [1.5k/1.7k objects] 92% Done / [1.5k/1.7k objects] 92% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/securedcluster-stackrox-secured-cluster-services-proxy-env_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/sensor-dockercfg-jr4kf_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/service-ca_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/sensor-monitoring-tls_describe.log... / [1.5k/1.7k objects] 92% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/sensor-tls_describe.log... / [1.5k/1.7k objects] 92% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/sh.helm.release.v1.stackrox-central-services.v1_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/sh.helm.release.v1.stackrox-secured-cluster-services.v1_describe.log... / [1.5k/1.7k objects] 92% Done / [1.5k/1.7k objects] 92% Done / [1.5k/1.7k objects] 92% Done / [1.5k/1.7k objects] 92% Done / [1.5k/1.7k objects] 93% Done / [1.5k/1.7k objects] 93% Done / [1.5k/1.7k objects] 93% Done / [1.5k/1.7k objects] 93% Done / [1.5k/1.7k objects] 93% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/sh.helm.release.v1.webhookserver.v1_describe.log... / [1.6k/1.7k objects] 93% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/tls-cert-admission-control_describe.log... / [1.6k/1.7k objects] 93% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/tls-cert-scanner-v4-indexer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/stackrox_describe.log... / [1.6k/1.7k objects] 93% Done / [1.6k/1.7k objects] 93% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/tls-cert-scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/tls-cert-scanner-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/securedclusters/stackrox-secured-cluster-services_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/tls-cert-collector_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/tls-cert-scanner-v4-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/webhook-server-certs_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/secrets/tls-cert-sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/serviceaccounts/admission-control_describe.log... / [1.6k/1.7k objects] 93% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/serviceaccounts/central-db_describe.log... / [1.6k/1.7k objects] 93% Done / [1.6k/1.7k objects] 93% Done / [1.6k/1.7k objects] 93% Done / [1.6k/1.7k objects] 93% Done / [1.6k/1.7k objects] 93% Done / [1.6k/1.7k objects] 93% Done / [1.6k/1.7k objects] 93% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/serviceaccounts/config-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/services/admission-control_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/serviceaccounts/collector_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/serviceaccounts/scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/serviceaccounts/central_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/services/central-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/services/scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/services/central-loadbalancer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/services/central_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/services/webhookserver_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/services/scanner-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/serviceaccounts/sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/services/sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/services/sensor-webhook_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 94% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 95% Done / [1.6k/1.7k objects] 96% Done / [1.6k/1.7k objects] 96% Done / [1.6k/1.7k objects] 96% Done / [1.6k/1.7k objects] 96% Done / [1.6k/1.7k objects] 96% Done / [1.6k/1.7k objects] 96% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... / [1.6k/1.7k objects] 96% Done / [1.6k/1.7k objects] 96% Done / [1.6k/1.7k objects] 96% Done / [1.6k/1.7k objects] 96% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [1.6k/1.7k objects] 96% Done / [1.6k/1.7k objects] 96% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [1.6k/1.7k objects] 96% Done / [1.6k/1.7k objects] 96% Done / [1.6k/1.7k objects] 96% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... / [1.6k/1.7k objects] 96% Done / [1.6k/1.7k objects] 96% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/validatingwebhookconfigurations/stackrox_describe.log... / [1.6k/1.7k objects] 97% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251031/1984093266622025728-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-tests-aws/part-2/k8s-logs/stackrox/validatingwebhookconfigurations/machine-api_describe.log... / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 97% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 98% Done / [1.6k/1.7k objects] 99% Done / [1.6k/1.7k objects] 99% Done / [1.6k/1.7k objects] 99% Done / [1.6k/1.7k objects] 99% Done / [1.6k/1.7k objects] 99% Done / [1.6k/1.7k objects] 99% Done / [1.7k/1.7k objects] 99% Done / [1.7k/1.7k objects] 99% Done / [1.7k/1.7k objects] 99% Done / [1.7k/1.7k objects] 99% Done / [1.7k/1.7k objects] 99% Done / [1.7k/1.7k objects] 99% Done / [1.7k/1.7k objects] 99% Done / [1.7k/1.7k objects] 99% Done / [1.7k/1.7k objects] 99% Done / [1.7k/1.7k objects] 99% Done / [1.7k/1.7k objects] 100% Done Operation completed over 1.7k objects. 06:23:58: Running post command: ['scripts/ci/store-artifacts.sh', 'make_artifacts_help'] INFO: Fri Oct 31 06:23:58 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.54.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Fri Oct 31 06:24:00 UTC 2025: Artifacts are stored in a GCS bucket (gs://stackrox-ci-artifacts) 06:24:00: Running post command: ['qa-tests-backend/scripts/lib.sh', 'surface_spec_logs'] 06:24:01: Running post command: ['tests/e2e/lib.sh', 'handle_e2e_progress_failures'] INFO: Fri Oct 31 06:24:01 UTC 2025: Checking for progress events INFO: Fri Oct 31 06:24:01 UTC 2025: No job specific progress markers are saved for: ocp-qa-e2e-tests **** **** 06:24:01: final post completed **** INFO: Fri Oct 31 06:24:01 UTC 2025: Executing a general purpose exit trap for CI Exit code is: 0 INFO: Fri Oct 31 06:24:01 UTC 2025: Post processing junit records to JIRA issues, BigQuery metrics and Slack attachments as appropriate INFO: Fri Oct 31 06:24:01 UTC 2025: Will use junit2jira to create CSV for BigQuery input time="Oct 31 06:24:02" level=info msg="Found 0 failed tests" INFO: Fri Oct 31 06:24:02 UTC 2025: Saving Big Query test records from /tmp/tmp.cqYCu7LWrk.csv to gs://stackrox-ci-artifacts/test-metrics/upload Copying file:///tmp/tmp.cqYCu7LWrk.csv to gs://stackrox-ci-artifacts/test-metrics/upload/tmp.cqYCu7LWrk.csv .. INFO: Fri Oct 31 06:24:03 UTC 2025: Process state at exit: PID PPID S TTY TIME COMMAND 1 0 S ? 00:00:00 /tmp/entrypoint-wrapper/entrypoint-wrapper /tools/entrypoint 19 1 S ? 00:00:00 /tools/entrypoint 27 19 S ? 00:00:00 /bin/real-bash -c #!/bin/bash set -eu #!/bin/bash function install_yq() { # Install yq manually if not found in image echo "Installing yq" mkdir -p /tmp/bin export PATH=$PATH:/tmp/bin/ curl -L "https://github.com/mikefarah/yq/releases/latest/download/yq_linux_$(uname -m | sed 's/aarch64/arm64/;s/x86_64/amd64/')" \ -o /tmp/bin/yq && chmod +x /tmp/bin/yq # Verify installation cmd_yq="$(/tmp/bin/yq --version 2>/dev/null || true)" if [ -n "$cmd_yq" ]; then echo "yq version: $cmd_yq" else # Skip test mapping since yq isn't available export MAP_TESTS="false" fi } function mapTestsForComponentReadiness() { if [[ $MAP_TESTS == "true" ]]; then results_file="${1}" echo "Patching Tests Result File: ${results_file}" if [ -f "${results_file}" ]; then echo "Mapping Test Suite Name To: ACS-lp-interop" /tmp/bin/yq eval -ox -iI0 '.testsuite."+@name" = "ACS-lp-interop"' $results_file || echo "Warning: yq failed for ${results_file}, debug manually" >&2 fi fi } # Archive results function function cleanup-collect() { if [[ $MAP_TESTS == "true" ]]; then install_yq original_results="${ARTIFACT_DIR}/original_results/" mkdir "${original_results}" || true echo "Collecting original results in ${original_results}" # Keep a copy of all the original Junit files before modifying them cp -r "${ARTIFACT_DIR}"/junit-* "${original_results}" || echo "Warning: couldn't copy original files" >&2 find "${ARTIFACT_DIR}" -type f -iname "*.xml" | while IFS= read -r result_file; do # Map tests if needed for related use cases mapTestsForComponentReadiness "${result_file}" done # Send modified files to shared dir for Data Router Reporter step cp -r "${ARTIFACT_DIR}"/junit-* "${SHARED_DIR}" || echo "Warning: couldn't copy files to SHARED_DIR" >&2 fi } # Post test execution trap 'cleanup-collect' SIGINT SIGTERM ERR EXIT job="${TEST_SUITE:-${JOB_NAME_SAFE#merge-}}" job="${job#nightly-}" # this part is used for interop opp testing under stolostron/policy-collection if [ ! -f ".openshift-ci/dispatch.sh" ];then if [ ! -d "stackrox" ];then git clone https://github.com/stackrox/stackrox.git fi cd stackrox || exit fi .openshift-ci/dispatch.sh "${job}" 28 27 S ? 00:00:00 /bin/real-bash .openshift-ci/dispatch.sh ocp-qa-e2e-tests 6508 1 Z ? 00:00:00 [real-bash] 6512 1 Z ? 00:00:00 [real-bash] 13287 1 Z ? 00:00:00 [real-bash] 13291 1 Z ? 00:00:00 [real-bash] 13301 1 Z ? 00:00:00 [real-bash] 14352 1 Z ? 00:00:00 [real-bash] 14356 1 Z ? 00:00:00 [real-bash] 14405 1 S ? 00:00:00 /bin/real-bash /go/src/github.com/stackrox/stackrox/scripts/ci/create-webhookserver.sh restart_webhook_server_port_forward collector-v2g62 14408 14405 S ? 00:00:00 kubectl -n stackrox port-forward svc/webhookserver 8080:8080 -v=6 14697 1 S ? 00:05:06 /usr/lib/jvm/java-17-openjdk-17.0.14.0.7-2.el9.x86_64/bin/java --add-opens=java.base/java.lang=ALL-UNNAMED --add-opens=java.base/java.lang.invoke=ALL-UNNAMED --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.prefs/java.util.prefs=ALL-UNNAMED --add-exports=jdk.compiler/com.sun.tools.javac.api=ALL-UNNAMED --add-exports=jdk.compiler/com.sun.tools.javac.util=ALL-UNNAMED --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.prefs/java.util.prefs=ALL-UNNAMED --add-opens=java.base/java.nio.charset=ALL-UNNAMED --add-opens=java.base/java.net=ALL-UNNAMED --add-opens=java.base/java.util.concurrent.atomic=ALL-UNNAMED --add-opens=java.xml/javax.xml.namespace=ALL-UNNAMED -Xmx4G -Dfile.encoding=UTF-8 -Duser.country=US -Duser.language=en -Duser.variant -cp /alabama/wrapper/dists/gradle-8.13-bin/5xuhj0ry160q40clulazy9h7d/gradle-8.13/lib/gradle-daemon-main-8.13.jar -javaagent:/alabama/wrapper/dists/gradle-8.13-bin/5xuhj0ry160q40clulazy9h7d/gradle-8.13/lib/agents/gradle-instrumentation-agent-8.13.jar org.gradle.launcher.daemon.bootstrap.GradleDaemon 8.13 18049 1 Z ? 00:00:00 [kubectl] 98168 1 Z ? 00:00:00 [kubectl] 193961 28 R ? 00:00:00 ps -e -O ppid Ignoring ci-operator entrypoint or defunct process: 1 0 S ? 00:00:00 /tmp/entrypoint-wrapper/entrypoint-wrapper /tools/entrypoint Ignoring ci-operator entrypoint or defunct process: 19 1 S ? 00:00:00 /tools/entrypoint xargs: unmatched single quote; by default quotes are special to xargs unless you use the -0 option Installing yq % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 10.9M 100 10.9M 0 0 41.4M 0 --:--:-- --:--:-- --:--:-- 41.4M yq version: yq (https://github.com/mikefarah/yq/) version v4.48.1 Collecting original results in /logs/artifacts/original_results/ Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-prebuilt-start.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-system-start.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-system-await.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-prebuilt-await.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-OOM Check.xml Mapping Test Suite Name To: ACS-lp-interop Error: stat /logs/artifacts/junit-misc/junit-OOM: no such file or directory Warning: yq failed for /logs/artifacts/junit-misc/junit-OOM Check.xml, debug manually Patching Tests Result File: /logs/artifacts/junit-misc/junit-Check unexpected pod restarts.xml Mapping Test Suite Name To: ACS-lp-interop Error: stat /logs/artifacts/junit-misc/junit-Check: no such file or directory Warning: yq failed for /logs/artifacts/junit-misc/junit-Check unexpected pod restarts.xml, debug manually Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-scanner-db.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-config-controller.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-central-db.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-scanner.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-webhookserver.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-collector.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-admission-control.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-sensor.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-central.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-Image_Availability.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-Stackrox_Deployment.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testBegin/TEST-VulnMgmtSACTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-DeclarativeConfigTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ProcessesListeningOnPortsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ImageManagementTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ProcessBaselinesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ProcessVisualizationReplicaTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentCheck.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AttemptedAlertsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CloudSourcesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-SACTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AutocompleteTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkBaselineTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ExternalNetworkSourcesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ImageSignatureVerificationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationsSplunkViolationsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkFlowTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GraphQLResourcePaginationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ProcessVisualizationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnMgmtWorkflowTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RbacAuthTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-K8sEventDetectionTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NodeTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnScanWithGraphQLTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-HelpersTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClustersTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PaginationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ImageScanningTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CertRotationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RuntimeViolationLifecycleTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationHealthTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-LocalQaPropsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-BuiltinPoliciesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AdmissionControllerNoImageScanTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClientCertAuthTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnReportingTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClusterInitBundleTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuditScrubbingTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkSimulator.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnMgmtTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PolicyFieldsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DefaultPoliciesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RetryTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GlobalSearch.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NamespaceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-K8sRbacTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RoutesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DiagnosticBundleTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CSVTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuditLogAlertsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NodeInventoryTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GroupsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuthServiceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CertExpiryTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-Enforcement.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-SecretsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RiskTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentEventGraphQLTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PolicyConfigurationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RuntimePolicyTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-2-tests/testSensorBounce/TEST-ReconciliationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-2-tests/testSensorBounceNext/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-2-tests/testSensorBounceNext/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-system-await.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-prebuilt-await.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-OOM Check.xml Mapping Test Suite Name To: ACS-lp-interop Error: stat /logs/artifacts/original_results/junit-misc/junit-OOM: no such file or directory Warning: yq failed for /logs/artifacts/original_results/junit-misc/junit-OOM Check.xml, debug manually Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Check unexpected pod restarts.xml Mapping Test Suite Name To: ACS-lp-interop Error: stat /logs/artifacts/original_results/junit-misc/junit-Check: no such file or directory Warning: yq failed for /logs/artifacts/original_results/junit-misc/junit-Check unexpected pod restarts.xml, debug manually Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-scanner-db.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-config-controller.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-central-db.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-scanner.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-webhookserver.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-collector.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-admission-control.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-sensor.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-central.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Image_Availability.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Stackrox_Deployment.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-prebuilt-start.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-system-start.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testBegin/TEST-VulnMgmtSACTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ProcessVisualizationReplicaTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentCheck.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AttemptedAlertsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CloudSourcesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-SACTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AutocompleteTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkBaselineTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ExternalNetworkSourcesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ImageSignatureVerificationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationsSplunkViolationsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkFlowTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GraphQLResourcePaginationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ProcessVisualizationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnMgmtWorkflowTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RbacAuthTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-K8sEventDetectionTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NodeTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnScanWithGraphQLTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-HelpersTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClustersTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PaginationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ImageScanningTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CertRotationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RuntimeViolationLifecycleTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationHealthTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-LocalQaPropsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-BuiltinPoliciesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AdmissionControllerNoImageScanTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClientCertAuthTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnReportingTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClusterInitBundleTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuditScrubbingTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkSimulator.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnMgmtTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PolicyFieldsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DefaultPoliciesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RetryTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GlobalSearch.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NamespaceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-K8sRbacTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RoutesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DiagnosticBundleTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CSVTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuditLogAlertsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NodeInventoryTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GroupsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuthServiceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CertExpiryTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-Enforcement.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-SecretsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RiskTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentEventGraphQLTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PolicyConfigurationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RuntimePolicyTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-DeclarativeConfigTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ProcessesListeningOnPortsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ImageManagementTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ProcessBaselinesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-2-tests/testSensorBounceNext/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-2-tests/testSensorBounceNext/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-2-tests/testSensorBounce/TEST-ReconciliationTest.xml Mapping Test Suite Name To: ACS-lp-interop Installing yq % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 10.9M 100 10.9M 0 0 96.9M 0 --:--:-- --:--:-- --:--:-- 96.9M yq version: yq (https://github.com/mikefarah/yq/) version v4.48.1 mkdir: cannot create directory '/logs/artifacts/original_results/': File exists Collecting original results in /logs/artifacts/original_results/ Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-prebuilt-start.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-system-start.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-system-await.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-prebuilt-await.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-OOM Check.xml Mapping Test Suite Name To: ACS-lp-interop Error: stat /logs/artifacts/junit-misc/junit-OOM: no such file or directory Warning: yq failed for /logs/artifacts/junit-misc/junit-OOM Check.xml, debug manually Patching Tests Result File: /logs/artifacts/junit-misc/junit-Check unexpected pod restarts.xml Mapping Test Suite Name To: ACS-lp-interop Error: stat /logs/artifacts/junit-misc/junit-Check: no such file or directory Warning: yq failed for /logs/artifacts/junit-misc/junit-Check unexpected pod restarts.xml, debug manually Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-scanner-db.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-config-controller.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-central-db.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-scanner.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-webhookserver.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-collector.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-admission-control.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-sensor.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-SuspiciousLog-central.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-Image_Availability.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-Stackrox_Deployment.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testBegin/TEST-VulnMgmtSACTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-DeclarativeConfigTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ProcessesListeningOnPortsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ImageManagementTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ProcessBaselinesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ProcessVisualizationReplicaTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentCheck.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AttemptedAlertsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CloudSourcesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-SACTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AutocompleteTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkBaselineTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ExternalNetworkSourcesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ImageSignatureVerificationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationsSplunkViolationsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkFlowTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GraphQLResourcePaginationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ProcessVisualizationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnMgmtWorkflowTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RbacAuthTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-K8sEventDetectionTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NodeTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnScanWithGraphQLTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-HelpersTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClustersTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PaginationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ImageScanningTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CertRotationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RuntimeViolationLifecycleTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationHealthTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-LocalQaPropsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-BuiltinPoliciesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AdmissionControllerNoImageScanTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClientCertAuthTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnReportingTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClusterInitBundleTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuditScrubbingTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkSimulator.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnMgmtTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PolicyFieldsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DefaultPoliciesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RetryTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GlobalSearch.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NamespaceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-K8sRbacTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RoutesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DiagnosticBundleTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CSVTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuditLogAlertsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NodeInventoryTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GroupsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuthServiceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CertExpiryTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-Enforcement.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-SecretsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RiskTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentEventGraphQLTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PolicyConfigurationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RuntimePolicyTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-2-tests/testSensorBounce/TEST-ReconciliationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-2-tests/testSensorBounceNext/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-2-tests/testSensorBounceNext/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-system-await.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-prebuilt-await.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-OOM Check.xml Mapping Test Suite Name To: ACS-lp-interop Error: stat /logs/artifacts/original_results/junit-misc/junit-OOM: no such file or directory Warning: yq failed for /logs/artifacts/original_results/junit-misc/junit-OOM Check.xml, debug manually Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Check unexpected pod restarts.xml Mapping Test Suite Name To: ACS-lp-interop Error: stat /logs/artifacts/original_results/junit-misc/junit-Check: no such file or directory Warning: yq failed for /logs/artifacts/original_results/junit-misc/junit-Check unexpected pod restarts.xml, debug manually Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-scanner-db.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-config-controller.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-central-db.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-scanner.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-webhookserver.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-collector.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-admission-control.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-sensor.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-SuspiciousLog-central.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Image_Availability.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Stackrox_Deployment.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-prebuilt-start.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-system-start.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testBegin/TEST-VulnMgmtSACTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ProcessVisualizationReplicaTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentCheck.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AttemptedAlertsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CloudSourcesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-SACTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AutocompleteTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkBaselineTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ExternalNetworkSourcesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ImageSignatureVerificationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationsSplunkViolationsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkFlowTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GraphQLResourcePaginationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ProcessVisualizationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnMgmtWorkflowTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RbacAuthTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-K8sEventDetectionTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NodeTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnScanWithGraphQLTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-HelpersTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClustersTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PaginationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ImageScanningTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CertRotationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RuntimeViolationLifecycleTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationHealthTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-LocalQaPropsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-BuiltinPoliciesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AdmissionControllerNoImageScanTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClientCertAuthTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnReportingTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClusterInitBundleTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuditScrubbingTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkSimulator.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnMgmtTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PolicyFieldsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DefaultPoliciesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RetryTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GlobalSearch.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NamespaceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-K8sRbacTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RoutesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DiagnosticBundleTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CSVTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuditLogAlertsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NodeInventoryTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GroupsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuthServiceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CertExpiryTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-Enforcement.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-SecretsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RiskTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentEventGraphQLTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PolicyConfigurationTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RuntimePolicyTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-DeclarativeConfigTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ProcessesListeningOnPortsTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ImageManagementTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ProcessBaselinesTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-2-tests/testSensorBounceNext/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-2-tests/testSensorBounceNext/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACS-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-2-tests/testSensorBounce/TEST-ReconciliationTest.xml Mapping Test Suite Name To: ACS-lp-interop