INFO: Thu Nov 27 04:23:09 UTC 2025: BEGIN OpenShift CI mods INFO: Thu Nov 27 04:23:09 UTC 2025: Current Status: STABLE_MAIN_VERSION 4.10.x-442-g3e9694559e STABLE_COLLECTOR_VERSION 3.23.x-43-gd759b32efb STABLE_FACT_VERSION 0.1.0 STABLE_SCANNER_VERSION 2.38.x-24-gcd5fb7a6d1 STABLE_GIT_SHORT_SHA 3e9694559e fatal: no tag exactly matches '3e9694559e49260fecbf2f8c5fcabe3643bf1fc3' Warning: Cannot get tag INFO: Thu Nov 27 04:23:13 UTC 2025: Status after mods: STABLE_MAIN_VERSION 4.10.x-442-g3e9694559e STABLE_COLLECTOR_VERSION 3.23.x-43-gd759b32efb STABLE_FACT_VERSION 0.1.0 STABLE_SCANNER_VERSION 2.38.x-24-gcd5fb7a6d1 STABLE_GIT_SHORT_SHA 3e9694559e INFO: Thu Nov 27 04:23:17 UTC 2025: END OpenShift CI mods INFO: Thu Nov 27 04:23:17 UTC 2025: Allow restricted SCC for all users and namespaces. clusterrolebinding.rbac.authorization.k8s.io/system:openshift:scc:restricted created **** **** 04:23:17: About to provision **** Using kubeconfig from /tmp/kubeconfig-2956403061 Nodes: NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-122-153.ec2.internal Ready worker 27m v1.34.1 10.0.122.153 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-16-184.ec2.internal Ready worker 20m v1.34.1 10.0.16.184 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-2-27.ec2.internal Ready control-plane,master 31m v1.34.1 10.0.2.27 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-32-248.ec2.internal Ready worker 27m v1.34.1 10.0.32.248 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-4-174.ec2.internal Ready control-plane,master 32m v1.34.1 10.0.4.174 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-97-71.ec2.internal Ready control-plane,master 34m v1.34.1 10.0.97.71 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 **** **** 04:23:17: provisioned **** **** **** 04:23:17: About to run initial pre test **** INFO: Thu Nov 27 04:23:18 UTC 2025: Record some cluster info parse error: Invalid numeric literal at line 26, column 8 INFO: Thu Nov 27 04:23:19 UTC 2025: Starting image pre-fetcher of pre-built images (NOT built for current commit)... + deploy go: downloading github.com/stackrox/image-prefetcher/deploy v0.3.0 INFO: Thu Nov 27 04:23:25 UTC 2025: Using /go/src/github.com/stackrox/stackrox/.gotools/bin/deploy v0.3.0 for image prefetch deployment make: Entering directory '/go/src/github.com/stackrox/stackrox/operator' echo '{ "apiVersion": "v1", "kind": "Namespace", "metadata": { "name": "prefetch-images" } }' | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh apply -f - namespace/prefetch-images created /go/src/github.com/stackrox/stackrox/operator//../deploy/common/pull-secret.sh stackrox quay.io | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh -n "prefetch-images" apply -f - Warning: providing passwords via (exported) environment variables is unsafe. secret/stackrox created make: Leaving directory '/go/src/github.com/stackrox/stackrox/operator' role.rbac.authorization.k8s.io/privileged-scc-use created rolebinding.rbac.authorization.k8s.io/prefetcher-privileged created deployment.apps/qa-e2e-metrics created service/qa-e2e-metrics created daemonset.apps/qa-e2e created configmap/qa-e2e created INFO: Thu Nov 27 04:23:27 UTC 2025: Image pre-fetcher is now running in the background. Its status will be checked later (look for message starting with Waiting for pre-fetcher). Proceeding with other tasks in the meantime. INFO: Thu Nov 27 04:23:27 UTC 2025: Polling for images required for system tests INFO: Thu Nov 27 04:23:28 UTC 2025: Will poll for: central-db main roxctl stackrox-operator stackrox-operator-bundle stackrox-operator-index INFO: Thu Nov 27 04:23:28 UTC 2025: Checking for central-db using https://quay.io/api/v1/repository/rhacs-eng/central-db/tag?specificTag=4.10.x-442-g3e9694559e {"tags": [{"name": "4.10.x-442-g3e9694559e", "reversion": false, "start_ts": 1764179066, "manifest_digest": "sha256:cb05d94c3093a80320f8877ce7a906f96b3f1c7d52f3a079256a5bb0210038fe", "is_manifest_list": true, "size": null, "last_modified": "Wed, 26 Nov 2025 17:44:26 -0000"}], "page": 1, "has_additional": false} INFO: Thu Nov 27 04:23:28 UTC 2025: Checking for main using https://quay.io/api/v1/repository/rhacs-eng/main/tag?specificTag=4.10.x-442-g3e9694559e {"tags": [{"name": "4.10.x-442-g3e9694559e", "reversion": false, "start_ts": 1764178938, "end_ts": 1772041338, "manifest_digest": "sha256:037ed6a831f570c91a94363cc2a76a717778c6fc29d8c3de6164bb593c3d0649", "is_manifest_list": true, "size": null, "last_modified": "Wed, 26 Nov 2025 17:42:18 -0000", "expiration": "Wed, 25 Feb 2026 17:42:18 -0000"}], "page": 1, "has_additional": false} INFO: Thu Nov 27 04:23:29 UTC 2025: Checking for roxctl using https://quay.io/api/v1/repository/rhacs-eng/roxctl/tag?specificTag=4.10.x-442-g3e9694559e {"tags": [{"name": "4.10.x-442-g3e9694559e", "reversion": false, "start_ts": 1764179012, "end_ts": 1772041412, "manifest_digest": "sha256:a436ab40dd30ca2c321825bf8d2505319110e2038435d47afdc6fdd195896dba", "is_manifest_list": true, "size": null, "last_modified": "Wed, 26 Nov 2025 17:43:32 -0000", "expiration": "Wed, 25 Feb 2026 17:43:32 -0000"}], "page": 1, "has_additional": false} INFO: Thu Nov 27 04:23:29 UTC 2025: Checking for stackrox-operator using https://quay.io/api/v1/repository/rhacs-eng/stackrox-operator/tag?specificTag=4.10.0-442-g3e9694559e {"tags": [{"name": "4.10.0-442-g3e9694559e", "reversion": false, "start_ts": 1764178100, "manifest_digest": "sha256:5fdec034b31c88b5d46b780b24eaa022dddb9d71770d04defbf6f94a0ff078e1", "is_manifest_list": true, "size": null, "last_modified": "Wed, 26 Nov 2025 17:28:20 -0000"}], "page": 1, "has_additional": false} INFO: Thu Nov 27 04:23:30 UTC 2025: Checking for stackrox-operator-bundle using https://quay.io/api/v1/repository/rhacs-eng/stackrox-operator-bundle/tag?specificTag=v4.10.0-442-g3e9694559e {"tags": [{"name": "v4.10.0-442-g3e9694559e", "reversion": false, "start_ts": 1764177917, "manifest_digest": "sha256:9f3ce533149462c0571f4eb2083d7c6b58998aa10b0c85c6ef063e83aeaa620c", "is_manifest_list": false, "size": 47166, "last_modified": "Wed, 26 Nov 2025 17:25:17 -0000"}, {"name": "v4.10.0-442-g3e9694559e", "reversion": false, "start_ts": 1764177615, "end_ts": 1764177917, "manifest_digest": "sha256:2533e33478b383a16bc366115f89da0e0632c9f2ef32216011fda25c2410966b", "is_manifest_list": false, "size": 47159, "last_modified": "Wed, 26 Nov 2025 17:20:15 -0000", "expiration": "Wed, 26 Nov 2025 17:25:17 -0000"}], "page": 1, "has_additional": false} INFO: Thu Nov 27 04:23:30 UTC 2025: Checking for stackrox-operator-index using https://quay.io/api/v1/repository/rhacs-eng/stackrox-operator-index/tag?specificTag=v4.10.0-442-g3e9694559e {"tags": [{"name": "v4.10.0-442-g3e9694559e", "reversion": false, "start_ts": 1764177947, "manifest_digest": "sha256:29808fe3ed2b8b7f4e56567d50a8526d977109aa2fe46cc9f0305cc04f32f8f0", "is_manifest_list": false, "size": 20524225, "last_modified": "Wed, 26 Nov 2025 17:25:47 -0000"}, {"name": "v4.10.0-442-g3e9694559e", "reversion": false, "start_ts": 1764177647, "end_ts": 1764177947, "manifest_digest": "sha256:2d4b71635686e1072b08351ef5909e586b42fcf6fa53519591c893c424591648", "is_manifest_list": false, "size": 20524226, "last_modified": "Wed, 26 Nov 2025 17:20:47 -0000", "expiration": "Wed, 26 Nov 2025 17:25:47 -0000"}], "page": 1, "has_additional": false} INFO: Thu Nov 27 04:23:31 UTC 2025: All images exist. INFO: Thu Nov 27 04:23:31 UTC 2025: Starting image pre-fetcher of system images (built for current commit)... make: Nothing to be done for 'image-prefetcher-deploy-bin'. INFO: Thu Nov 27 04:23:32 UTC 2025: Using /go/src/github.com/stackrox/stackrox/.gotools/bin/deploy v0.3.0 for image prefetch deployment make: Entering directory '/go/src/github.com/stackrox/stackrox/operator' echo '{ "apiVersion": "v1", "kind": "Namespace", "metadata": { "name": "prefetch-images" } }' | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh apply -f - namespace/prefetch-images unchanged /go/src/github.com/stackrox/stackrox/operator//../deploy/common/pull-secret.sh stackrox quay.io | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh -n "prefetch-images" apply -f - Warning: providing passwords via (exported) environment variables is unsafe. secret/stackrox unchanged make: Leaving directory '/go/src/github.com/stackrox/stackrox/operator' role.rbac.authorization.k8s.io/privileged-scc-use unchanged rolebinding.rbac.authorization.k8s.io/prefetcher-privileged unchanged deployment.apps/stackrox-images-metrics created service/stackrox-images-metrics created daemonset.apps/stackrox-images created configmap/stackrox-images created INFO: Thu Nov 27 04:23:34 UTC 2025: Image pre-fetcher is now running in the background. Its status will be checked later (look for message starting with Waiting for pre-fetcher). Proceeding with other tasks in the meantime. **** **** 04:23:34: initial pre test completed **** **** **** 04:23:34: About to run [QA tests part I] **** **** **** 04:23:34: About to run pre test [QA tests part I] **** **** **** 04:23:34: pre test completed [QA tests part I] **** **** **** 04:23:34: About to run test [QA tests part I] **** Executing qa-tests-backend tests (part I) INFO: Thu Nov 27 04:23:34 UTC 2025: Starting test (qa-tests-backend part I) INFO: Thu Nov 27 04:23:34 UTC 2025: Configuring the cluster to run part 1 of e2e tests INFO: Thu Nov 27 04:23:34 UTC 2025: Setting up GCP auth and config Activated service account credentials for: [stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com] Credentialed Accounts ACTIVE ACCOUNT * stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com To set the active account, run: $ gcloud config set account `ACCOUNT` Updated property [core/project]. Updated property [compute/region]. Unset property [compute/zone]. Updated property [core/disable_prompts]. INFO: Thu Nov 27 04:23:40 UTC 2025: Setting up the deployment environment INFO: Thu Nov 27 04:23:41 UTC 2025: Set POD_SECURITY_POLICIES variable based on kubernetes version INFO: Thu Nov 27 04:23:41 UTC 2025: POD_SECURITY_POLICIES set to false INFO: Thu Nov 27 04:23:41 UTC 2025: Will remove any existing stackrox resources INFO: Thu Nov 27 04:23:41 UTC 2025: Tearing down StackRox resources for namespaces stackrox... out: No resources found out: Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "securitypolicies.config.stackrox.io" not found INFO: Thu Nov 27 04:23:43 UTC 2025: Finished tearing down resources. INFO: Thu Nov 27 04:23:43 UTC 2025: Setting up default certs for tests /go/src/github.com/stackrox/stackrox/deploy/openshift/default_TLS_certs /go/src/github.com/stackrox/stackrox ----- Certificate request self-signature ok subject=CN=Intermediate Server CA Certificate request self-signature ok subject=CN=custom-tls-cert.central.stackrox.local /go/src/github.com/stackrox/stackrox Contents of /go/src/github.com/stackrox/stackrox/deploy/openshift/default_TLS_certs: total 56 drwx------. 2 1002430000 root 4096 Nov 27 04:23 . drwxrwxr-x. 1 root root 31 Nov 27 04:23 .. -rw-r--r--. 1 1002430000 root 1082 Nov 27 04:23 ca.crt -rw-------. 1 1002430000 root 1704 Nov 27 04:23 ca.key -rw-r--r--. 1 1002430000 root 41 Nov 27 04:23 ca.srl -rw-r--r--. 1 1002430000 root 1509 Nov 27 04:23 intermediate.crt -rw-------. 1 1002430000 root 3272 Nov 27 04:23 intermediate.key -rw-r--r--. 1 1002430000 root 41 Nov 27 04:23 intermediate.srl -rw-------. 1 1002430000 root 6211 Nov 27 04:23 keystore.p12 -rw-r--r--. 1 1002430000 root 1911 Nov 27 04:23 leaf.crt -rw-------. 1 1002430000 root 3272 Nov 27 04:23 leaf.key -rw-r--r--. 1 1002430000 root 4502 Nov 27 04:23 tls.crt -rw-------. 1 1002430000 root 3272 Nov 27 04:23 tls.key INFO: Thu Nov 27 04:23:45 UTC 2025: Waiting for pre-fetcher of system images to complete... INFO: Thu Nov 27 04:23:45 UTC 2025: Waiting for image prefetcher set stackrox-images to complete... Waiting for daemon set "stackrox-images" rollout to finish: 0 of 6 updated pods are available... Waiting for daemon set "stackrox-images" rollout to finish: 1 of 6 updated pods are available... Waiting for daemon set "stackrox-images" rollout to finish: 2 of 6 updated pods are available... Waiting for daemon set "stackrox-images" rollout to finish: 3 of 6 updated pods are available... Waiting for daemon set "stackrox-images" rollout to finish: 4 of 6 updated pods are available... Waiting for daemon set "stackrox-images" rollout to finish: 5 of 6 updated pods are available... daemon set "stackrox-images" successfully rolled out INFO: Thu Nov 27 04:26:19 UTC 2025: All images in the set are now pre-fetched. INFO: Thu Nov 27 04:26:19 UTC 2025: Now retrieving prefetcher metrics... INFO: Thu Nov 27 04:26:20 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json INFO: Thu Nov 27 04:26:20 UTC 2025: Saving Big Query test records from /tmp/tmp.l13D2UeTdW.csv to gs://stackrox-ci-artifacts/image-prefetches-metrics/upload Copying file:///tmp/tmp.l13D2UeTdW.csv to gs://stackrox-ci-artifacts/image-prefetches-metrics/upload/tmp.l13D2UeTdW.csv .. INFO: Thu Nov 27 04:26:22 UTC 2025: Image pre-fetcher metrics retrieved and saved. INFO: Thu Nov 27 04:26:22 UTC 2025: About to deploy StackRox (Central + Sensor). INFO: Thu Nov 27 04:26:22 UTC 2025: Set POD_SECURITY_POLICIES variable based on kubernetes version INFO: Thu Nov 27 04:26:22 UTC 2025: POD_SECURITY_POLICIES set to false INFO: Thu Nov 27 04:26:22 UTC 2025: Deploying ACS operator make: Entering directory '/go/src/github.com/stackrox/stackrox/operator' + kubectl-kuttl go: downloading github.com/kudobuilder/kuttl v0.23.0 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading k8s.io/apimachinery v0.34.2 go: downloading github.com/spf13/cobra v1.9.1 go: downloading sigs.k8s.io/controller-runtime v0.22.4 go: downloading github.com/spf13/pflag v1.0.7 go: downloading k8s.io/client-go v0.34.2 go: downloading github.com/docker/docker v28.5.2+incompatible go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading sigs.k8s.io/kind v0.30.0 go: downloading github.com/Masterminds/semver/v3 v3.3.1 go: downloading k8s.io/api v0.34.2 go: downloading github.com/google/cel-go v0.26.1 go: downloading k8s.io/apiextensions-apiserver v0.34.2 go: downloading github.com/dustinkirkland/golang-petname v0.0.0-20191129215211-8e5a1ed0cff0 go: downloading github.com/thoas/go-funk v0.9.3 go: downloading github.com/go-logr/zapr v1.3.0 go: downloading go.uber.org/zap v1.27.0 go: downloading k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 go: downloading github.com/evanphx/json-patch/v5 v5.9.11 go: downloading google.golang.org/protobuf v1.36.7 go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250303144028-a0af3efb3deb go: downloading al.essio.dev/pkg/shellescape v1.5.1 go: downloading golang.org/x/sys v0.35.0 go: downloading go.yaml.in/yaml/v2 v2.4.2 go: downloading github.com/google/gnostic-models v0.7.0 go: downloading golang.org/x/net v0.43.0 go: downloading golang.org/x/term v0.34.0 go: downloading github.com/stoewer/go-strcase v1.3.0 go: downloading github.com/antlr4-go/antlr/v4 v4.13.0 go: downloading gomodules.xyz/jsonpatch/v2 v2.4.0 go: downloading github.com/prometheus/client_golang v1.22.0 go: downloading golang.org/x/time v0.9.0 go: downloading github.com/go-openapi/jsonreference v0.20.2 go: downloading github.com/go-openapi/swag v0.23.0 go: downloading golang.org/x/oauth2 v0.27.0 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20250303144028-a0af3efb3deb go: downloading github.com/containerd/errdefs/pkg v0.3.0 go: downloading github.com/docker/go-connections v0.4.0 go: downloading github.com/opencontainers/image-spec v1.0.2 go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.58.0 go: downloading go.opentelemetry.io/otel/trace v1.35.0 go: downloading github.com/BurntSushi/toml v1.4.0 go: downloading golang.org/x/sync v0.16.0 go: downloading github.com/fsnotify/fsnotify v1.9.0 go: downloading github.com/docker/go-units v0.4.0 go: downloading github.com/moby/docker-image-spec v1.3.1 go: downloading golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 go: downloading go.opentelemetry.io/otel v1.35.0 go: downloading github.com/go-openapi/jsonpointer v0.21.0 go: downloading github.com/mailru/easyjson v0.7.7 go: downloading golang.org/x/text v0.28.0 go: downloading go.opentelemetry.io/otel/metric v1.35.0 go: downloading github.com/prometheus/client_model v0.6.1 go: downloading github.com/prometheus/common v0.62.0 go: downloading github.com/prometheus/procfs v0.15.1 go: downloading go.opentelemetry.io/auto/sdk v1.1.0 KUTTL=/go/src/github.com/stackrox/stackrox/operator/.gotools/bin/kubectl-kuttl PATH="/go/src/github.com/stackrox/stackrox/operator//hack:${PATH}" ./hack/olm-operator-install.sh stackrox-operator quay.io/rhacs-eng/stackrox-operator-index v4.10.0-442-g3e9694559e v4.10.0-442-g3e9694559e latest 2025-11-27T04:26:56Z Creating namespace... namespace/stackrox-operator created 2025-11-27T04:26:56Z Applying operator manifests... catalogsource.operators.coreos.com/stackrox-operator-test-index created operatorgroup.operators.coreos.com/all-namespaces-operator-group created subscription.operators.coreos.com/stackrox-operator-test-subscription created 2025-11-27T04:26:57Z Waiting for an install plan to be created subscription.operators.coreos.com/stackrox-operator-test-subscription condition met 2025-11-27T04:27:32Z Verifying that the subscription is progressing to the expected CSV of v4.10.0-442-g3e9694559e... 2025-11-27T04:27:32Z Approving install plan install-mlrwz installplan.operators.coreos.com/install-mlrwz patched 2025-11-27T04:27:32Z Waiting for the v4.10.0-442-g3e9694559e CSV to finish installing. assert is valid 2025-11-27T04:27:48Z Making sure the v4.10.0-442-g3e9694559e operator deployment is available... deployment.apps/rhacs-operator-controller-manager condition met make: Leaving directory '/go/src/github.com/stackrox/stackrox/operator' INFO: Thu Nov 27 04:27:48 UTC 2025: Deploying central to namespace stackrox This does not appear to be a PR context INFO: Thu Nov 27 04:27:48 UTC 2025: Warning: checking for a label in a non PR context: details: { "msg": "this is not a PR" }, exitstatus: 1 This does not appear to be a PR context INFO: Thu Nov 27 04:27:48 UTC 2025: Warning: checking for a label in a non PR context: details: { "msg": "this is not a PR" }, exitstatus: 1 INFO: Thu Nov 27 04:27:48 UTC 2025: Deploying central using operator into namespace stackrox namespace/stackrox created make: Entering directory '/go/src/github.com/stackrox/stackrox/operator' echo '{ "apiVersion": "v1", "kind": "Namespace", "metadata": { "name": "stackrox" } }' | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh apply -f - namespace/stackrox configured Warning: resource namespaces/stackrox is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. /go/src/github.com/stackrox/stackrox/operator//../deploy/common/pull-secret.sh stackrox quay.io | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh -n "stackrox" apply -f - Warning: providing passwords via (exported) environment variables is unsafe. secret/stackrox created make: Leaving directory '/go/src/github.com/stackrox/stackrox/operator' central.platform.stackrox.io/stackrox-central-services created secret/central-admin-pass created secret/central-default-tls-secret created INFO: Thu Nov 27 04:27:50 UTC 2025: Waiting for stackrox deploy/central to appear INFO: Thu Nov 27 04:28:10 UTC 2025: Using existing ROX_ADMIN_PASSWORD env INFO: Thu Nov 27 04:28:10 UTC 2025: Waiting for Central to be ready in namespace stackrox INFO: Thu Nov 27 04:28:10 UTC 2025: Waiting 600s (increased for openshift-ci provisioned clusters) for central api and 3600 for ingress... INFO: Thu Nov 27 04:28:10 UTC 2025: Waiting for deployment central to be ready in namespace stackrox INFO: Thu Nov 27 04:28:10 UTC 2025: Still waiting (0s/600s)... INFO: Thu Nov 27 04:28:15 UTC 2025: Still waiting (5s/600s)... INFO: Thu Nov 27 04:28:21 UTC 2025: Still waiting (11s/600s)... INFO: Thu Nov 27 04:28:26 UTC 2025: Still waiting (16s/600s)... INFO: Thu Nov 27 04:28:41 UTC 2025: Deployment central is ready in namespace stackrox. INFO: Thu Nov 27 04:28:41 UTC 2025: Central deployment is ready in namespace stackrox. INFO: Thu Nov 27 04:28:41 UTC 2025: Waiting for Central API endpoint INFO: Thu Nov 27 04:28:41 UTC 2025: Found ingress endpoint: af73e1c2a9ec5411aa21d0cf3a95de57-2001228783.XXXXXXXXX.elb.amazonaws.com INFO: Thu Nov 27 04:28:41 UTC 2025: Attempting to get 6 'ok' responses in a row from https://af73e1c2a9ec5411aa21d0cf3a95de57-2001228783.XXXXXXXXX.elb.amazonaws.com:443/v1/ping INFO: Thu Nov 27 04:28:41 UTC 2025: Curl exited with status 6 and returned ''. INFO: Thu Nov 27 04:28:46 UTC 2025: Curl exited with status 6 and returned ''. INFO: Thu Nov 27 04:28:51 UTC 2025: Curl exited with status 6 and returned ''. INFO: Thu Nov 27 04:28:56 UTC 2025: Status is now: ok INFO: Thu Nov 27 04:28:58 UTC 2025: Curl exited with status 6 and returned ''. INFO: Thu Nov 27 04:29:03 UTC 2025: Status is now: ok INFO: Thu Nov 27 04:29:05 UTC 2025: Status is now: ok INFO: Thu Nov 27 04:29:07 UTC 2025: Status is now: ok INFO: Thu Nov 27 04:29:11 UTC 2025: Status is now: ok INFO: Thu Nov 27 04:29:13 UTC 2025: Status is now: ok INFO: Thu Nov 27 04:29:15 UTC 2025: Setting up client certs for tests /go/src/github.com/stackrox/stackrox/deploy/openshift/client_TLS_certs /go/src/github.com/stackrox/stackrox ----- Certificate request self-signature ok subject=CN=Intermediate Client CA Certificate request self-signature ok subject=CN=Client Certificate User /go/src/github.com/stackrox/stackrox Contents of /go/src/github.com/stackrox/stackrox/deploy/openshift/client_TLS_certs: total 56 drwx------. 2 1002430000 root 4096 Nov 27 04:29 . drwxrwxr-x. 1 root root 55 Nov 27 04:29 .. -rw-r--r--. 1 1002430000 root 1082 Nov 27 04:29 ca.crt -rw-------. 1 1002430000 root 1704 Nov 27 04:29 ca.key -rw-r--r--. 1 1002430000 root 41 Nov 27 04:29 ca.srl -rw-r--r--. 1 1002430000 root 1509 Nov 27 04:29 intermediate.crt -rw-------. 1 1002430000 root 3268 Nov 27 04:29 intermediate.key -rw-r--r--. 1 1002430000 root 41 Nov 27 04:29 intermediate.srl -rw-------. 1 1002430000 root 6179 Nov 27 04:29 keystore.p12 -rw-r--r--. 1 1002430000 root 1870 Nov 27 04:29 leaf.crt -rw-------. 1 1002430000 root 3272 Nov 27 04:29 leaf.key -rw-r--r--. 1 1002430000 root 4461 Nov 27 04:29 tls.crt -rw-------. 1 1002430000 root 3272 Nov 27 04:29 tls.key INFO: Thu Nov 27 04:29:16 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json INFO: Thu Nov 27 04:29:16 UTC 2025: Deploying sensor into namespace stackrox (central is expected in namespace stackrox) INFO: Thu Nov 27 04:29:16 UTC 2025: Deploying sensor using operator into namespace stackrox (central is expected in namespace stackrox) make: Entering directory '/go/src/github.com/stackrox/stackrox/operator' echo '{ "apiVersion": "v1", "kind": "Namespace", "metadata": { "name": "stackrox" } }' | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh apply -f - namespace/stackrox unchanged /go/src/github.com/stackrox/stackrox/operator//../deploy/common/pull-secret.sh stackrox quay.io | /go/src/github.com/stackrox/stackrox/operator//hack/retry-kubectl.sh -n "stackrox" apply -f - Warning: providing passwords via (exported) environment variables is unsafe. secret/stackrox unchanged make: Leaving directory '/go/src/github.com/stackrox/stackrox/operator' INFO: Successfully generated new init bundle. Name: my-test-bundle Created at: seconds:1764217758 nanos:80289360 Expires at: seconds:1795753740 Created By: admin ID: 8470a052-f406-4dd1-9b7e-64bf3e1b9949 INFO: The init bundle needs to be stored securely, since it contains secrets. INFO: It is not possible to retrieve previously generated init bundles. secret/collector-tls created secret/sensor-tls created secret/admission-control-tls created Overriding the product default collection method due to COLLECTION_METHOD variable: core_bpf securedcluster.platform.stackrox.io/stackrox-secured-cluster-services created INFO: Thu Nov 27 04:29:18 UTC 2025: Waiting for stackrox deploy/sensor to appear daemonset.apps/collector env updated Sensor deployed. Waiting for sensor to be up Waiting for sensor to start in namespace stackrox Sensor replicas: 1 Sensor readyReplicas: null Sensor is running NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE collector 6 6 6 0 6 21s Waiting for collectors to start Collectors are running Waiting for sensor to start in namespace stackrox Sensor is running NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE collector 6 6 6 0 6 22s Waiting for collectors to start Collectors are running INFO: Thu Nov 27 04:29:50 UTC 2025: Will wait for collectors to reach a ready state in namespace stackrox Waiting for daemon set "collector" rollout to finish: 0 out of 6 new pods have been updated... Waiting for daemon set "collector" rollout to finish: 0 out of 6 new pods have been updated... Waiting for daemon set "collector" rollout to finish: 1 out of 6 new pods have been updated... Waiting for daemon set "collector" rollout to finish: 1 out of 6 new pods have been updated... Waiting for daemon set "collector" rollout to finish: 2 out of 6 new pods have been updated... Waiting for daemon set "collector" rollout to finish: 2 out of 6 new pods have been updated... Waiting for daemon set "collector" rollout to finish: 3 out of 6 new pods have been updated... Waiting for daemon set "collector" rollout to finish: 3 out of 6 new pods have been updated... Waiting for daemon set "collector" rollout to finish: 4 out of 6 new pods have been updated... Waiting for daemon set "collector" rollout to finish: 4 out of 6 new pods have been updated... Waiting for daemon set "collector" rollout to finish: 5 out of 6 new pods have been updated... Waiting for daemon set "collector" rollout to finish: 5 out of 6 new pods have been updated... Waiting for daemon set "collector" rollout to finish: 5 out of 6 new pods have been updated... Waiting for daemon set "collector" rollout to finish: 5 of 6 updated pods are available... daemon set "collector" successfully rolled out Checking readiness of collector-46897 collector-46897 is deemed ready Checking readiness of collector-btw8k collector-btw8k is deemed ready Checking readiness of collector-f6grb collector-f6grb is deemed ready Checking readiness of collector-gtt9f collector-gtt9f is deemed ready Checking readiness of collector-k2jf6 collector-k2jf6 is deemed ready Checking readiness of collector-vtrn9 collector-vtrn9 is deemed ready central.platform.stackrox.io/stackrox-central-services annotated securedcluster.platform.stackrox.io/stackrox-secured-cluster-services annotated INFO: Thu Nov 27 04:30:33 UTC 2025: Installing optional components used in E2E tests INFO: Thu Nov 27 04:30:33 UTC 2025: Skipping the compliance operator install INFO: Thu Nov 27 04:30:33 UTC 2025: Skipping the workload identity setup. INFO: Thu Nov 27 04:30:33 UTC 2025: Deploy Default PSP for stackrox namespace INFO: Thu Nov 27 04:30:33 UTC 2025: POD_SECURITY_POLICIES is false, skip Deploy Default PSP for stackrox namespace INFO: Thu Nov 27 04:30:33 UTC 2025: Deploy Webhook server /go/src/github.com/stackrox/stackrox/deploy/openshift/webhook_server_certs /go/src/github.com/stackrox/stackrox ----- Certificate request self-signature ok subject=CN=Intermediate Webhook Server CA Certificate request self-signature ok subject=CN=webhookserver.stackrox /go/src/github.com/stackrox/stackrox /go/src/github.com/stackrox/stackrox/webhookserver /go/src/github.com/stackrox/stackrox Release "webhookserver" does not exist. Installing it now. NAME: webhookserver LAST DEPLOYED: Thu Nov 27 04:30:34 2025 NAMESPACE: stackrox STATUS: deployed REVISION: 1 TEST SUITE: None /go/src/github.com/stackrox/stackrox Waiting for deployment "webhookserver" rollout to finish: 0 of 1 updated replicas are available... deployment "webhookserver" successfully rolled out INFO: Thu Nov 27 04:30:50 UTC 2025: Get AWS ECR Docker Pull Password aws-cli/2.7.17 Python/3.9.11 Linux/5.14.0-570.64.1.el9_6.x86_64 exe/x86_64.centos.9 prompt/off INFO: Thu Nov 27 04:30:51 UTC 2025: Waiting for pre-fetcher of pre-built images to complete... INFO: Thu Nov 27 04:30:51 UTC 2025: Waiting for image prefetcher set qa-e2e to complete... daemon set "qa-e2e" successfully rolled out INFO: Thu Nov 27 04:30:52 UTC 2025: All images in the set are now pre-fetched. INFO: Thu Nov 27 04:30:52 UTC 2025: Now retrieving prefetcher metrics... INFO: Thu Nov 27 04:30:52 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json INFO: Thu Nov 27 04:30:52 UTC 2025: Saving Big Query test records from /tmp/tmp.cUkWmhK1hv.csv to gs://stackrox-ci-artifacts/image-prefetches-metrics/upload Copying file:///tmp/tmp.cUkWmhK1hv.csv to gs://stackrox-ci-artifacts/image-prefetches-metrics/upload/tmp.cUkWmhK1hv.csv .. INFO: Thu Nov 27 04:30:54 UTC 2025: Image pre-fetcher metrics retrieved and saved. INFO: Thu Nov 27 04:30:54 UTC 2025: QA Automation Platform Part 1 Error from server (NotFound): securitycontextconstraints.security.openshift.io "qatest-anyuid" not found securitycontextconstraints.security.openshift.io/qatest-anyuid created INFO: Thu Nov 27 04:30:55 UTC 2025: Running all QA tests by default... INFO: Thu Nov 27 04:30:55 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json make: Entering directory '/go/src/github.com/stackrox/stackrox/qa-tests-backend' + copy scanner protos rm -rf src/main/proto/scanner + build/generated TEST_TARGET="build/generated" ./gradlew generateProto generateTestProto Downloading https://services.gradle.org/distributions/gradle-8.13-bin.zip .............10%.............20%.............30%.............40%.............50%.............60%.............70%.............80%.............90%.............100% Welcome to Gradle 8.13! Here are the highlights of this release: - Daemon JVM auto-provisioning - Enhancements for Scala plugin and JUnit testing - Improvements for build authors and plugin developers For more details see https://docs.gradle.org/8.13/release-notes.html Starting a Gradle Daemon (subsequent builds will be faster) Type-safe project accessors is an incubating feature. > Task :annotations:compileJava NO-SOURCE > Task :annotations:compileGroovy Couldn't create user preferences directory. User preferences are unusable. java.io.IOException: No such file or directory > Task :annotations:processResources NO-SOURCE > Task :annotations:classes > Task :annotations:jar > Task :extractIncludeProto > Task :extractProto > Task :generateProto Could not lock User prefs. Unix error code 2. Couldn't flush user prefs: java.util.prefs.BackingStoreException: Couldn't get file lock. > Task :compileJava Note: Some input files use or override a deprecated API. Note: Recompile with -Xlint:deprecation for details. Could not lock User prefs. Unix error code 2. Couldn't flush user prefs: java.util.prefs.BackingStoreException: Couldn't get file lock. Could not lock User prefs. Unix error code 2. Couldn't flush user prefs: java.util.prefs.BackingStoreException: Couldn't get file lock. Could not lock User prefs. Unix error code 2. Couldn't flush user prefs: java.util.prefs.BackingStoreException: Couldn't get file lock. > Task :compileGroovy > Task :processResources > Task :classes > Task :extractIncludeTestProto > Task :extractTestProto > Task :generateTestProto NO-SOURCE [Incubating] Problems report is available at: file:///go/src/github.com/stackrox/stackrox/qa-tests-backend/build/reports/problems/problems-report.html Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0. You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins. For more on this, please refer to https://docs.gradle.org/8.13/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation. BUILD SUCCESSFUL in 2m 54s 10 actionable tasks: 10 executed + compile Type-safe project accessors is an incubating feature. > Task :annotations:compileJava NO-SOURCE > Task :annotations:compileGroovy UP-TO-DATE > Task :annotations:processResources NO-SOURCE > Task :annotations:classes UP-TO-DATE > Task :annotations:jar UP-TO-DATE > Task :extractIncludeProto UP-TO-DATE > Task :extractProto UP-TO-DATE > Task :generateProto UP-TO-DATE > Task :compileJava UP-TO-DATE > Task :compileGroovy UP-TO-DATE > Task :processResources UP-TO-DATE > Task :classes UP-TO-DATE > Task :jar > Task :assemble > Task :annotations:assemble UP-TO-DATE > Task :extractIncludeTestProto UP-TO-DATE > Task :extractTestProto UP-TO-DATE > Task :generateTestProto NO-SOURCE > Task :compileTestJava NO-SOURCE > Task :compileTestGroovy Couldn't create user preferences directory. User preferences are unusable. java.io.IOException: No such file or directory > Task :processTestResources > Task :testClasses > Task :annotations:compileTestJava NO-SOURCE > Task :annotations:compileTestGroovy NO-SOURCE > Task :annotations:processTestResources NO-SOURCE > Task :annotations:testClasses UP-TO-DATE [Incubating] Problems report is available at: file:///go/src/github.com/stackrox/stackrox/qa-tests-backend/build/reports/problems/problems-report.html Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0. You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins. For more on this, please refer to https://docs.gradle.org/8.13/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation. BUILD SUCCESSFUL in 13s 13 actionable tasks: 3 executed, 10 up-to-date + test TEST_TARGET="test" ./gradlew testBegin testParallel testRest Type-safe project accessors is an incubating feature. > Task :annotations:compileJava NO-SOURCE > Task :annotations:compileGroovy UP-TO-DATE > Task :annotations:processResources NO-SOURCE > Task :annotations:classes UP-TO-DATE > Task :annotations:jar UP-TO-DATE > Task :extractIncludeProto UP-TO-DATE > Task :extractProto UP-TO-DATE > Task :generateProto UP-TO-DATE > Task :compileJava UP-TO-DATE > Task :compileGroovy UP-TO-DATE > Task :processResources UP-TO-DATE > Task :classes UP-TO-DATE > Task :extractIncludeTestProto UP-TO-DATE > Task :extractTestProto UP-TO-DATE > Task :generateTestProto NO-SOURCE > Task :compileTestJava NO-SOURCE > Task :compileTestGroovy UP-TO-DATE > Task :processTestResources UP-TO-DATE > Task :testClasses UP-TO-DATE > Task :testBegin VulnMgmtSACTest STANDARD_OUT 04:34:12 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Starting testsuite 04:34:12 | INFO | VulnMgmtSACTest | BaseSpecification | Performing global setup 04:34:12 | DEBUG | VulnMgmtSACTest | Kubernetes | quay: secret created. 04:34:12 | DEBUG | VulnMgmtSACTest | Kubernetes | public-dockerhub: secret created. 04:34:13 | DEBUG | VulnMgmtSACTest | Kubernetes | gcr-image-pull-secret: secret created. 04:34:13 | DEBUG | VulnMgmtSACTest | Kubernetes | redhat-image-pull-secret: secret created. 04:34:13 | DEBUG | VulnMgmtSACTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:34:13 | INFO | VulnMgmtSACTest | BaseSpecification | Testing against: 04:34:13 | INFO | VulnMgmtSACTest | BaseSpecification | version: "4.10.x-442-g3e9694559e" build_flavor: "development" license_status: VALID 04:34:13 | INFO | VulnMgmtSACTest | BaseSpecification | isGKE: false 04:34:13 | INFO | VulnMgmtSACTest | BaseSpecification | isEKS: false 04:34:13 | INFO | VulnMgmtSACTest | BaseSpecification | isOpenShift4: true 04:34:13 | INFO | VulnMgmtSACTest | BaseSpecification | testTarget: test 04:34:14 | INFO | VulnMgmtSACTest | BaseSpecification | Adding core image registry integration 04:34:14 | DEBUG | VulnMgmtSACTest | ImageIntegrationService | Integration tested: core quay 04:34:14 | DEBUG | VulnMgmtSACTest | ImageIntegrationService | Integration created: core quay: 4f02c4da-ebd3-43d6-979d-09e16b592c15 04:34:14 | DEBUG | VulnMgmtSACTest | ImageIntegrationService | Integration found after creation: core quay: 4f02c4da-ebd3-43d6-979d-09e16b592c15 04:34:14 | DEBUG | VulnMgmtSACTest | OpenShift | Namespace qa already exists 04:34:14 | DEBUG | VulnMgmtSACTest | OpenShift | Adding system:serviceaccount:qa:default to anyuid user list 04:34:27 | DEBUG | VulnMgmtSACTest | VulnMgmtSACTest | Scanned Image quay.io/rhacs-eng/qa:centos7-base 04:34:34 | DEBUG | VulnMgmtSACTest | VulnMgmtSACTest | Scanned Image quay.io/rhacs-eng/qa-multi-arch:nginx-1.12@sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728 04:34:34 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: imageVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: imageVulnerabilityCount(query: $query)\n }\n fragment cveFields on ImageVulnerability {\n cve\n }\n ","variables":{"query":"Image:*"}} 04:34:34 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"cve":"CVE-2005-2541","__typename":"ImageVulnerability"},{"cve":"CVE-2007-4559","__typename":"ImageVulnerability"},{"cve":"CVE-2007-5686","__typename":"ImageVulnerability"},{"cve":"CVE-2007-6755","__typename":"ImageVulnerability"},{"cve":"CVE-2009-4487","__typename":"ImageVulnerability"},{"cve":"CVE-2009-5155","__typename":"ImageVulnerability"},{"cve":"CVE-2010-0928","__typename":"ImageVulnerability"},{"cve":"CVE-2010-4756","__typename":"ImageVulnerability"},{"cve":"CVE-2011-3374","__typename":"ImageVulnerability"},{"cve":"CVE-2011-4116","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6702","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6711","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0337","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0340","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0341","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1664","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1665","__typename":"ImageVulnerability"},{"cve":"CVE-2013-4... 04:34:34 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | CVE data successfully indexed: 1149 CVEs found 04:34:34 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Created Role: name: "node-role" permission_set_id: "c2e8834c-0803-4542-9568-d084aef6afca" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 04:34:34 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Created Role: name: "image-role" permission_set_id: "3c1ca2b4-8688-48ac-a7a6-d3b9880c1a56" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 04:34:34 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Created Role: name: "node-image-role" permission_set_id: "bfd44af9-b69a-42f4-b5a6-cbbcc2359092" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" VulnMgmtSACTest > Verify role based scoping on vuln mgmt: node-role Node:* STANDARD_OUT 04:34:34 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Starting testcase: Verify role based scoping on vuln mgmt: node-role Node:* 04:34:34 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: nodeVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: nodeVulnerabilityCount(query: $query)\n }\n fragment cveFields on NodeVulnerability {\n cve\n }\n ","variables":{"query":"Node:*"}} 04:34:34 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:34:34 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: nodeComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: nodeComponentCount(query: $query)\n }\n fragment componentFields on NodeComponent {\n name\n version\n }\n ","variables":{"query":"Node:*"}} 04:34:34 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:34:34 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: nodeVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: nodeVulnerabilityCount(query: $query)\n }\n fragment cveFields on NodeVulnerability {\n cve\n }\n ","variables":{"query":""}} 04:34:34 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:34:34 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: nodeComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: nodeComponentCount(query: $query)\n }\n fragment componentFields on NodeComponent {\n name\n version\n }\n ","variables":{"query":""}} 04:34:34 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:34:34 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Ending testcase VulnMgmtSACTest > Verify role based scoping on vuln mgmt: node-role Node:* PASSED VulnMgmtSACTest > Verify role based scoping on vuln mgmt: image-role Image:* STANDARD_OUT 04:34:35 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Starting testcase: Verify role based scoping on vuln mgmt: image-role Image:* 04:34:35 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: imageVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: imageVulnerabilityCount(query: $query)\n }\n fragment cveFields on ImageVulnerability {\n cve\n }\n ","variables":{"query":"Image:*"}} 04:34:35 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"cve":"CVE-2005-2541","__typename":"ImageVulnerability"},{"cve":"CVE-2007-4559","__typename":"ImageVulnerability"},{"cve":"CVE-2007-5686","__typename":"ImageVulnerability"},{"cve":"CVE-2007-6755","__typename":"ImageVulnerability"},{"cve":"CVE-2009-4487","__typename":"ImageVulnerability"},{"cve":"CVE-2009-5155","__typename":"ImageVulnerability"},{"cve":"CVE-2010-0928","__typename":"ImageVulnerability"},{"cve":"CVE-2010-4756","__typename":"ImageVulnerability"},{"cve":"CVE-2011-3374","__typename":"ImageVulnerability"},{"cve":"CVE-2011-4116","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6702","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6711","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0337","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0340","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0341","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1664","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1665","__typename":"ImageVulnerability"},{"cve":"CVE-2013-4... 04:34:35 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: imageComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: imageComponentCount(query: $query)\n }\n fragment componentFields on ImageComponent {\n name\n version\n }\n ","variables":{"query":"Image:*"}} 04:34:35 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"name":"aardvark-dns","version":"2:1.10.0-3.el9_4.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.2.51-15.el7","__typename":"ImageComponent"},{"name":"acl","version":"2.2.52-3","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-3.el9.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-4.el9.x86_64","__typename":"ImageComponent"},{"name":"adduser","version":"3.115","__typename":"ImageComponent"},{"name":"alternatives","version":"1.20-2.el9.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-1.el9_4.1.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-2.el9.x86_64","__typename":"ImageComponent"},{"name":"apt","version":"1.4.8","__typename":"ImageComponent"},{"name":"attr","version":"1:2.4.47-2","__typename":"ImageComponent"},{"name":"audit","version":"1:2.6.7-2","__typename":"ImageComponent"},{"name":"audit-libs","version":"2.8.5-4.el7","__typename":"ImageComponent"},{"name":"audit-libs","ver... 04:34:35 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: imageVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: imageVulnerabilityCount(query: $query)\n }\n fragment cveFields on ImageVulnerability {\n cve\n }\n ","variables":{"query":""}} 04:34:35 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"cve":"CVE-2005-2541","__typename":"ImageVulnerability"},{"cve":"CVE-2007-4559","__typename":"ImageVulnerability"},{"cve":"CVE-2007-5686","__typename":"ImageVulnerability"},{"cve":"CVE-2007-6755","__typename":"ImageVulnerability"},{"cve":"CVE-2009-4487","__typename":"ImageVulnerability"},{"cve":"CVE-2009-5155","__typename":"ImageVulnerability"},{"cve":"CVE-2010-0928","__typename":"ImageVulnerability"},{"cve":"CVE-2010-4756","__typename":"ImageVulnerability"},{"cve":"CVE-2011-3374","__typename":"ImageVulnerability"},{"cve":"CVE-2011-4116","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6702","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6711","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0337","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0340","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0341","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1664","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1665","__typename":"ImageVulnerability"},{"cve":"CVE-2013-4... 04:34:35 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: imageComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: imageComponentCount(query: $query)\n }\n fragment componentFields on ImageComponent {\n name\n version\n }\n ","variables":{"query":""}} 04:34:35 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"name":"aardvark-dns","version":"2:1.10.0-3.el9_4.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.2.51-15.el7","__typename":"ImageComponent"},{"name":"acl","version":"2.2.52-3","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-3.el9.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-4.el9.x86_64","__typename":"ImageComponent"},{"name":"adduser","version":"3.115","__typename":"ImageComponent"},{"name":"alternatives","version":"1.20-2.el9.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-1.el9_4.1.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-2.el9.x86_64","__typename":"ImageComponent"},{"name":"apt","version":"1.4.8","__typename":"ImageComponent"},{"name":"attr","version":"1:2.4.47-2","__typename":"ImageComponent"},{"name":"audit","version":"1:2.6.7-2","__typename":"ImageComponent"},{"name":"audit-libs","version":"2.8.5-4.el7","__typename":"ImageComponent"},{"name":"audit-libs","ver... 04:34:35 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Ending testcase VulnMgmtSACTest > Verify role based scoping on vuln mgmt: image-role Image:* PASSED VulnMgmtSACTest > Verify role based scoping on vuln mgmt: #roleName #baseQuery > Verify role based scoping on vuln mgmt: node-image-role Component:* STANDARD_OUT 04:34:35 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Starting testcase: Verify role based scoping on vuln mgmt: node-image-role Component:* 04:34:35 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: imageVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: imageVulnerabilityCount(query: $query)\n }\n fragment cveFields on ImageVulnerability {\n cve\n }\n ","variables":{"query":"ImageComponent:*"}} 04:34:35 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"cve":"CVE-2005-2541","__typename":"ImageVulnerability"},{"cve":"CVE-2007-4559","__typename":"ImageVulnerability"},{"cve":"CVE-2007-5686","__typename":"ImageVulnerability"},{"cve":"CVE-2007-6755","__typename":"ImageVulnerability"},{"cve":"CVE-2009-4487","__typename":"ImageVulnerability"},{"cve":"CVE-2009-5155","__typename":"ImageVulnerability"},{"cve":"CVE-2010-0928","__typename":"ImageVulnerability"},{"cve":"CVE-2010-4756","__typename":"ImageVulnerability"},{"cve":"CVE-2011-3374","__typename":"ImageVulnerability"},{"cve":"CVE-2011-4116","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6702","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6711","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0337","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0340","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0341","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1664","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1665","__typename":"ImageVulnerability"},{"cve":"CVE-2013-4... 04:34:35 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: imageComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: imageComponentCount(query: $query)\n }\n fragment componentFields on ImageComponent {\n name\n version\n }\n ","variables":{"query":"ImageComponent:*"}} 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"name":"aardvark-dns","version":"2:1.10.0-3.el9_4.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.2.51-15.el7","__typename":"ImageComponent"},{"name":"acl","version":"2.2.52-3","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-3.el9.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-4.el9.x86_64","__typename":"ImageComponent"},{"name":"adduser","version":"3.115","__typename":"ImageComponent"},{"name":"alternatives","version":"1.20-2.el9.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-1.el9_4.1.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-2.el9.x86_64","__typename":"ImageComponent"},{"name":"apt","version":"1.4.8","__typename":"ImageComponent"},{"name":"attr","version":"1:2.4.47-2","__typename":"ImageComponent"},{"name":"audit","version":"1:2.6.7-2","__typename":"ImageComponent"},{"name":"audit-libs","version":"2.8.5-4.el7","__typename":"ImageComponent"},{"name":"audit-libs","ver... 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: nodeVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: nodeVulnerabilityCount(query: $query)\n }\n fragment cveFields on NodeVulnerability {\n cve\n }\n ","variables":{"query":"NodeComponent:*"}} 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: nodeComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: nodeComponentCount(query: $query)\n }\n fragment componentFields on NodeComponent {\n name\n version\n }\n ","variables":{"query":"NodeComponent:*"}} 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: imageVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: imageVulnerabilityCount(query: $query)\n }\n fragment cveFields on ImageVulnerability {\n cve\n }\n ","variables":{"query":""}} 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"cve":"CVE-2005-2541","__typename":"ImageVulnerability"},{"cve":"CVE-2007-4559","__typename":"ImageVulnerability"},{"cve":"CVE-2007-5686","__typename":"ImageVulnerability"},{"cve":"CVE-2007-6755","__typename":"ImageVulnerability"},{"cve":"CVE-2009-4487","__typename":"ImageVulnerability"},{"cve":"CVE-2009-5155","__typename":"ImageVulnerability"},{"cve":"CVE-2010-0928","__typename":"ImageVulnerability"},{"cve":"CVE-2010-4756","__typename":"ImageVulnerability"},{"cve":"CVE-2011-3374","__typename":"ImageVulnerability"},{"cve":"CVE-2011-4116","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6702","__typename":"ImageVulnerability"},{"cve":"CVE-2012-6711","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0337","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0340","__typename":"ImageVulnerability"},{"cve":"CVE-2013-0341","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1664","__typename":"ImageVulnerability"},{"cve":"CVE-2013-1665","__typename":"ImageVulnerability"},{"cve":"CVE-2013-4... 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: imageComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: imageComponentCount(query: $query)\n }\n fragment componentFields on ImageComponent {\n name\n version\n }\n ","variables":{"query":""}} 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[{"name":"aardvark-dns","version":"2:1.10.0-3.el9_4.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.2.51-15.el7","__typename":"ImageComponent"},{"name":"acl","version":"2.2.52-3","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-3.el9.x86_64","__typename":"ImageComponent"},{"name":"acl","version":"2.3.1-4.el9.x86_64","__typename":"ImageComponent"},{"name":"adduser","version":"3.115","__typename":"ImageComponent"},{"name":"alternatives","version":"1.20-2.el9.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-1.el9_4.1.x86_64","__typename":"ImageComponent"},{"name":"alternatives","version":"1.24-2.el9.x86_64","__typename":"ImageComponent"},{"name":"apt","version":"1.4.8","__typename":"ImageComponent"},{"name":"attr","version":"1:2.4.47-2","__typename":"ImageComponent"},{"name":"audit","version":"1:2.6.7-2","__typename":"ImageComponent"},{"name":"audit-libs","version":"2.8.5-4.el7","__typename":"ImageComponent"},{"name":"audit-libs","ver... 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: nodeVulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: nodeVulnerabilityCount(query: $query)\n }\n fragment cveFields on NodeVulnerability {\n cve\n }\n ","variables":{"query":""}} 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getComponents($query: String, $pagination: Pagination)\n {\n results: nodeComponents(query: $query, pagination: $pagination) {\n ...componentFields\n __typename\n }\n count: nodeComponentCount(query: $query)\n }\n fragment componentFields on NodeComponent {\n name\n version\n }\n ","variables":{"query":""}} 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"results":[],"count":0}} 04:34:36 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Ending testcase VulnMgmtSACTest > Verify role based scoping on vuln mgmt: #roleName #baseQuery > Verify role based scoping on vuln mgmt: node-image-role Component:* PASSED VulnMgmtSACTest > Verify permissions on vuln mgmt: role with no CVE permissions is rejected STANDARD_OUT 04:34:36 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Starting testcase: Verify permissions on vuln mgmt: role with no CVE permissions is rejected 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL query: {"query":"\n query getCves($query: String, $pagination: Pagination)\n {\n results: vulnerabilities(query: $query, pagination: $pagination) {\n ...cveFields\n __typename\n }\n count: vulnerabilityCount(query: $query)\n }\n\n fragment cveFields on EmbeddedVulnerability {\n cve\n }\n ","variables":{"query":""}} 04:34:36 | DEBUG | VulnMgmtSACTest | GraphQLService | GraphQL response: HTTP/1.1 401 Unauthorized: access for this user is not authorized: no valid role, please contact your system administrator 04:34:36 | WARN | VulnMgmtSACTest | GraphQLService | There were errors in the graph QL response: services.GraphQLService$Response(401, null, [access for this user is not authorized: no valid role, please contact your system administrator ]) 04:34:36 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Ending testcase VulnMgmtSACTest > Verify permissions on vuln mgmt: role with no CVE permissions is rejected PASSED VulnMgmtSACTest STANDARD_OUT 04:34:36 | INFO | VulnMgmtSACTest | RoleService | Deleted role: node-role and permission set 04:34:36 | INFO | VulnMgmtSACTest | RoleService | Deleted role: image-role and permission set 04:34:37 | INFO | VulnMgmtSACTest | RoleService | Deleted role: node-image-role and permission set 04:34:37 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Ending testsuite 04:34:37 | INFO | VulnMgmtSACTest | VulnMgmtSACTest | Checking if cluster is healthy after test 04:34:37 | DEBUG | VulnMgmtSACTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries 04:34:37 | INFO | | BaseSpecification | Performing global shutdown 04:34:37 | INFO | | RoleService | Deleted role: Test Automation Role - 17956 and permission set 04:34:37 | INFO | | BaseSpecification | Removing core image registry integration 04:34:37 | DEBUG | | ImageIntegrationService | Image integration deleted: 4f02c4da-ebd3-43d6-979d-09e16b592c15 > Task :testParallel ProcessesListeningOnPortsTest STANDARD_OUT 04:34:41 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testsuite 04:34:41 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Starting testsuite 04:34:41 | INFO | ImageManagementTest | ImageManagementTest | Starting testsuite 04:34:41 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testsuite 04:34:41 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testsuite 04:34:41 | INFO | ProcessBaselinesTest | BaseSpecification | Performing global setup 04:34:41 | DEBUG | ProcessBaselinesTest | Kubernetes | quay: secret created. 04:34:42 | DEBUG | ProcessBaselinesTest | Kubernetes | public-dockerhub: secret created. 04:34:42 | DEBUG | ProcessBaselinesTest | Kubernetes | gcr-image-pull-secret: secret created. 04:34:42 | DEBUG | ProcessBaselinesTest | Kubernetes | redhat-image-pull-secret: secret created. 04:34:42 | DEBUG | ProcessBaselinesTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:34:42 | INFO | ProcessBaselinesTest | BaseSpecification | Testing against: 04:34:42 | INFO | ProcessBaselinesTest | BaseSpecification | version: "4.10.x-442-g3e9694559e" build_flavor: "development" license_status: VALID 04:34:42 | INFO | ProcessBaselinesTest | BaseSpecification | isGKE: false 04:34:42 | INFO | ProcessBaselinesTest | BaseSpecification | isEKS: false 04:34:42 | INFO | ProcessBaselinesTest | BaseSpecification | isOpenShift4: true 04:34:42 | INFO | ProcessBaselinesTest | BaseSpecification | testTarget: test 04:34:43 | INFO | ProcessBaselinesTest | BaseSpecification | Adding core image registry integration 04:34:43 | DEBUG | ProcessBaselinesTest | ImageIntegrationService | Integration tested: core quay 04:34:43 | DEBUG | ProcessBaselinesTest | ImageIntegrationService | Integration created: core quay: 5faf986d-3d04-4c7e-b330-b1e6117eeeb0 04:34:43 | DEBUG | ProcessBaselinesTest | ImageIntegrationService | Integration found after creation: core quay: 5faf986d-3d04-4c7e-b330-b1e6117eeeb0 04:34:43 | DEBUG | ProcessBaselinesTest | OpenShift | Namespace qa already exists ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Latest tag - quay.io STANDARD_OUT 04:34:43 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Starting testcase: Check successful creation, update, and deletion of declarative resources 04:34:43 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Latest tag - quay.io 04:34:43 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:34:43 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | created declarative configuration configMap 49454c22-4bca-40ef-adc2-64609645b062 04:34:43 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateExpectedHealthStatus with 60 retries 04:34:43 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for namespace qa-plop to be deleted 04:34:43 | DEBUG | ProcessesListeningOnPorts | Kubernetes | K8s found that namespace qa-plop was deleted 04:34:43 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for namespace qa-plop to be deleted 04:34:43 | DEBUG | ProcessesListeningOnPorts | Kubernetes | K8s found that namespace qa-plop was deleted ProcessesListeningOnPortsTest > Verify networking endpoints with processes appear in API at the deployment level STANDARD_OUT 04:34:43 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify networking endpoints with processes appear in API at the deployment level 04:34:43 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: health != null | | null false Expected resource 'declarative-config-test--permission-set' not found in health status. Available resources: Config Map declarative-configurations, Config Map sensitive-declarative-configurations 04:34:44 | INFO | ProcessesListeningOnPorts | OpenShift | Created namespace qa-plop 04:34:44 | INFO | ProcessesListeningOnPorts | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-plop namespace. 04:34:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | quay: secret created. 04:34:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | default-dockercfg-tkj7v: secret created. 04:34:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | redhat-image-pull-secret: secret created. 04:34:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | public-dockerhub: secret created. ProcessBaselinesTest > Verify processes risk indicators for the given key after lock on #deploymentName > Verify processes risk indicators for the given key after lock on pb-deploymentnginx-lock STANDARD_OUT 04:34:44 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Verify processes risk indicators for the given key after lock on pb-deploymentnginx-lock 04:34:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | gcr-image-pull-secret: secret created. 04:34:44 | DEBUG | ProcessesListeningOnPorts | OpenShift | Adding system:serviceaccount:qa-plop:default to anyuid user list 04:34:44 | INFO | ProcessBaselinesTest | OpenShift | Created namespace qa-process-baselines 04:34:44 | INFO | ProcessBaselinesTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-process-baselines namespace. 04:34:44 | DEBUG | ProcessBaselinesTest | Kubernetes | quay: secret created. 04:34:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1 service created 04:34:44 | DEBUG | ProcessBaselinesTest | Kubernetes | default-dockercfg-tkj7v: secret created. 04:34:44 | DEBUG | ProcessBaselinesTest | Kubernetes | redhat-image-pull-secret: secret created. 04:34:44 | DEBUG | ProcessBaselinesTest | Kubernetes | public-dockerhub: secret created. 04:34:44 | DEBUG | ProcessBaselinesTest | Kubernetes | gcr-image-pull-secret: secret created. 04:34:44 | DEBUG | ProcessBaselinesTest | OpenShift | Adding system:serviceaccount:qa-process-baselines:default to anyuid user list 04:34:44 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:34:44 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-nginx:latest with sendNotifications=false 04:34:44 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-lock 04:34:44 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-lock to start 04:34:45 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-lock's pods: 04:34:45 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-lock-7d54cc4c76-qcvw2 Container status: [] 04:34:45 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-lock 04:34:47 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-1 04:34:47 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:34:47 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2 service created 04:34:48 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-lock to start 04:34:48 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-lock's pods: 04:34:48 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-lock-7d54cc4c76-qcvw2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:34:45Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:34:48 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-lock 04:34:48 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-lock 04:34:48 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-lock with 1 pods 04:34:48 | INFO | ProcessBaselinesTest | Services | SR found deployment pb-deploymentnginx-lock within 0s 04:34:48 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-lock-7d54cc4c76-qcvw2 is running 04:34:48 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-lock-7d54cc4c76-qcvw2: [ls] 04:34:48 | DEBUG | | Kubernetes | Command exited with 0 04:34:48 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:34:48 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: bin boot dev etc home lib lib64 media mnt opt proc root run sbin srv sys tmp usr var Stderr: 04:34:48 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, e28d4e2c-32c0-47b9-b79d-4aebffc344d7, pb-deploymentnginx-lock within 0s 04:34:48 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 0 of 10): java.lang.RuntimeException: Baseline objects.Deployment@74b8eb91 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:e28d4e2c-32c0-47b9-b79d-4aebffc344d7:pb-deploymentnginx-lock" key { deployment_id: "e28d4e2c-32c0-47b9-b79d-4aebffc344d7" container_name: "pb-deploymentnginx-lock" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1764218088 nanos: 353253300 } stack_rox_locked_timestamp { seconds: 1764218148 nanos: 353253500 } last_update { seconds: 1764218088 nanos: 353253300 } . 04:34:49 | DEBUG | DeclarativeConfigTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:34:49 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:34:49 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | updated declarative permission set to be invalid in configMap 49454c22-4bca-40ef-adc2-64609645b062 04:34:49 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1764218086 nanos: 628753959 } 04:34:49 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-2 04:34:49 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:34:49 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3 service created 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-3 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-1 to start 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-1's pods: 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-5xbnt Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:34:48Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-1 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target-1 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-1 with 1 pods 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-2 to start 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-2's pods: 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-2-6f4fbcc974-w75zb Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:34:50Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-2 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target-2 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-2 with 1 pods 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-3 to start 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-3's pods: 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-3-767d5fbfd-zd8qf Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:34:51 | DEBUG | ProcessesListeningOnPorts | Kubernetes | 0/1 are in the ready state for tcp-connection-target-3 04:34:53 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Latest tag - quay.io PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Latest tag - quay.io (repeat) STANDARD_OUT 04:34:53 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Latest tag - quay.io (repeat) 04:34:53 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:34:53 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-nginx:latest with sendNotifications=false 04:34:54 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Latest tag - quay.io (repeat) PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - 90-Day Image Age - quay.io STANDARD_OUT 04:34:54 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - 90-Day Image Age - quay.io 04:34:54 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 1 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1764218086 nanos: 628753959 } 04:34:54 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-3 to start 04:34:54 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-3's pods: 04:34:54 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-3-767d5fbfd-zd8qf Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:34:51Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:34:54 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-3 04:34:54 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 3 seconds for k8s deployment tcp-connection-target-3 04:34:54 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-3 with 1 pods 04:34:54 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-1 within 0s 04:34:54 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-2 within 0s 04:34:54 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-3 within 0s 04:34:54 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:54 | INFO | ImageManagementTest | Services | Updated lifecycleStage of '90-Day Image Age - qa-image-management' to [BUILD, DEPLOY] 04:34:54 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch:struts-app with sendNotifications=false 04:34:55 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:56 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:57 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:58 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, e28d4e2c-32c0-47b9-b79d-4aebffc344d7, pb-deploymentnginx-lock within 0s 04:34:58 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 1 of 10): java.lang.RuntimeException: Baseline objects.Deployment@74b8eb91 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:e28d4e2c-32c0-47b9-b79d-4aebffc344d7:pb-deploymentnginx-lock" key { deployment_id: "e28d4e2c-32c0-47b9-b79d-4aebffc344d7" container_name: "pb-deploymentnginx-lock" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1764218088 nanos: 353253300 } stack_rox_locked_timestamp { seconds: 1764218148 nanos: 353253500 } last_update { seconds: 1764218088 nanos: 353253300 } . 04:34:58 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:34:59 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 2 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1764218086 nanos: 628753959 } 04:34:59 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:00 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:01 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:02 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:03 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - 90-Day Image Age - quay.io PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Ubuntu Package Manager in Image - quay.io STANDARD_OUT 04:35:03 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Ubuntu Package Manager in Image - quay.io 04:35:03 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:03 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Ubuntu Package Manager in Image - qa-image-management' to [BUILD, DEPLOY] 04:35:03 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch:struts-app with sendNotifications=false 04:35:04 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Ubuntu Package Manager in Image - quay.io PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Curl in Image - quay.io STANDARD_OUT 04:35:04 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Curl in Image - quay.io 04:35:04 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 3 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1764218086 nanos: 628753959 } 04:35:04 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Curl in Image - qa-image-management' to [BUILD, DEPLOY] 04:35:04 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:04 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch:struts-app with sendNotifications=false 04:35:04 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Curl in Image - quay.io PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Fixable CVSS >= 7 - quay.io STANDARD_OUT 04:35:04 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Fixable CVSS >= 7 - quay.io 04:35:05 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Fixable CVSS >= 7 - qa-image-management' to [BUILD, DEPLOY] 04:35:05 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:05 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch:nginx-1.12 with sendNotifications=false 04:35:06 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:07 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:08 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Fixable CVSS >= 7 - quay.io PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Wget in Image - quay.io STANDARD_OUT 04:35:08 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Wget in Image - quay.io 04:35:08 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, e28d4e2c-32c0-47b9-b79d-4aebffc344d7, pb-deploymentnginx-lock within 0s 04:35:08 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 2 of 10): java.lang.RuntimeException: Baseline objects.Deployment@74b8eb91 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:e28d4e2c-32c0-47b9-b79d-4aebffc344d7:pb-deploymentnginx-lock" key { deployment_id: "e28d4e2c-32c0-47b9-b79d-4aebffc344d7" container_name: "pb-deploymentnginx-lock" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1764218088 nanos: 353253300 } stack_rox_locked_timestamp { seconds: 1764218148 nanos: 353253500 } last_update { seconds: 1764218100 nanos: 617593096 } . 04:35:08 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Wget in Image - qa-image-management' to [BUILD, DEPLOY] 04:35:08 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa:struts-app with sendNotifications=false 04:35:08 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:09 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 4 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1764218086 nanos: 628753959 } 04:35:09 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:10 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:11 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:12 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:13 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:14 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 5 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1764218086 nanos: 628753959 } 04:35:14 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:15 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:16 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:17 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:18 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, e28d4e2c-32c0-47b9-b79d-4aebffc344d7, pb-deploymentnginx-lock within 0s 04:35:18 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 3 of 10): java.lang.RuntimeException: Baseline objects.Deployment@74b8eb91 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:e28d4e2c-32c0-47b9-b79d-4aebffc344d7:pb-deploymentnginx-lock" key { deployment_id: "e28d4e2c-32c0-47b9-b79d-4aebffc344d7" container_name: "pb-deploymentnginx-lock" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1764218088 nanos: 353253300 } stack_rox_locked_timestamp { seconds: 1764218148 nanos: 353253500 } last_update { seconds: 1764218100 nanos: 617593096 } . 04:35:18 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:19 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 6 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() | | | "" id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1764218086 nanos: 628753959 } 04:35:19 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:20 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:21 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:22 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Wget in Image - quay.io PASSED ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Apache Struts: CVE-2017-5638 - quay.io STANDARD_OUT 04:35:22 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint - Apache Struts: CVE-2017-5638 - quay.io 04:35:22 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:23 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Apache Struts: CVE-2017-5638 - qa-image-management' to [BUILD, DEPLOY] 04:35:23 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch:struts-app with sendNotifications=false 04:35:23 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint - #policyName - #imageRegistry #note > Verify CI/CD Integration Endpoint - Apache Struts: CVE-2017-5638 - quay.io PASSED ImageManagementTest > Verify two consecutive latest tag image have different scans STANDARD_OUT 04:35:23 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify two consecutive latest tag image have different scans 04:35:24 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:24 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:35:24 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | updated declarative access scope to be invalid in configMap 49454c22-4bca-40ef-adc2-64609645b062 04:35:24 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1764218121 nanos: 622541789 } 04:35:25 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:25 | INFO | AdmissionControllerTest | OpenShift | Created namespace qa-admission-controller-test 04:35:25 | INFO | AdmissionControllerTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-admission-controller-test namespace. 04:35:25 | DEBUG | AdmissionControllerTest | Kubernetes | quay: secret created. 04:35:25 | DEBUG | AdmissionControllerTest | Kubernetes | default-dockercfg-tkj7v: secret created. 04:35:25 | DEBUG | AdmissionControllerTest | Kubernetes | redhat-image-pull-secret: secret created. 04:35:25 | DEBUG | AdmissionControllerTest | Kubernetes | public-dockerhub: secret created. 04:35:25 | DEBUG | AdmissionControllerTest | Kubernetes | gcr-image-pull-secret: secret created. 04:35:25 | DEBUG | AdmissionControllerTest | OpenShift | Adding system:serviceaccount:qa-admission-controller-test:default to anyuid user list AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: no bypass annotation, non-bypassable STANDARD_OUT 04:35:25 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Config: no bypass annotation, non-bypassable 04:35:26 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:27 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:28 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:28 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, e28d4e2c-32c0-47b9-b79d-4aebffc344d7, pb-deploymentnginx-lock within 0s 04:35:28 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 4 of 10): java.lang.RuntimeException: Baseline objects.Deployment@74b8eb91 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:e28d4e2c-32c0-47b9-b79d-4aebffc344d7:pb-deploymentnginx-lock" key { deployment_id: "e28d4e2c-32c0-47b9-b79d-4aebffc344d7" container_name: "pb-deploymentnginx-lock" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1764218088 nanos: 353253300 } stack_rox_locked_timestamp { seconds: 1764218148 nanos: 353253500 } last_update { seconds: 1764218100 nanos: 617593096 } . 04:35:29 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:29 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 1 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1764218121 nanos: 622541789 } 04:35:30 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:30 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_0(AdmissionControllerTest.groovy:170) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:35:30 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: no bypass annotation, non-bypassable PASSED AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: bypass annotation, non-bypassable STANDARD_OUT 04:35:30 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Config: bypass annotation, non-bypassable 04:35:31 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:32 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:33 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:33 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify two consecutive latest tag image have different scans PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - nginx-1.19-alpine STANDARD_OUT 04:35:33 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - nginx-1.19-alpine 04:35:34 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:34 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 2 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1764218121 nanos: 622541789 } 04:35:35 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:35 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_0(AdmissionControllerTest.groovy:170) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:35:35 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: bypass annotation, non-bypassable PASSED AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: bypass annotation, bypassable STANDARD_OUT 04:35:35 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Config: bypass annotation, bypassable 04:35:36 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:37 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:38 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:38 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - nginx-1.19-alpine PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - busybox-1-30 STANDARD_OUT 04:35:38 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - busybox-1-30 04:35:38 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, e28d4e2c-32c0-47b9-b79d-4aebffc344d7, pb-deploymentnginx-lock within 0s 04:35:38 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 5 of 10): java.lang.RuntimeException: Baseline objects.Deployment@74b8eb91 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:e28d4e2c-32c0-47b9-b79d-4aebffc344d7:pb-deploymentnginx-lock" key { deployment_id: "e28d4e2c-32c0-47b9-b79d-4aebffc344d7" container_name: "pb-deploymentnginx-lock" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1764218088 nanos: 353253300 } stack_rox_locked_timestamp { seconds: 1764218148 nanos: 353253500 } last_update { seconds: 1764218100 nanos: 617593096 } . 04:35:39 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:39 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 3 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1764218121 nanos: 622541789 } 04:35:40 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:40 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:40 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify networking endpoints with processes appear in API at the deployment level PASSED ProcessesListeningOnPortsTest > Networking endpoints are no longer in the API when deployments are deleted STANDARD_OUT 04:35:40 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Networking endpoints are no longer in the API when deployments are deleted 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: Service deleting... 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: Service deleted 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-1 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: deployment removed. 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: Service deleting... 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: Service deleted 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-2 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: deployment removed. 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: Service deleting... 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: Service deleted 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-3 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: deployment removed. 04:35:40 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:40 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:40 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Networking endpoints are no longer in the API when deployments are deleted PASSED ProcessesListeningOnPortsTest > Verify networking endpoints disappear when process is terminated STANDARD_OUT 04:35:40 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify networking endpoints disappear when process is terminated 04:35:40 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:35:40 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - busybox-1-30 PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - centos7-base STANDARD_OUT 04:35:40 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - centos7-base 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1 service created 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-1 04:35:40 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2 service created 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-2 04:35:40 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3 service created 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-3 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-1 to start 04:35:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-1's pods: 04:35:41 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace busybox-bypass 04:35:41 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-5xbnt Container status: [ContainerState(running=null, terminated=ContainerStateTerminated(containerID=cri-o://759c4e7412a613af8e7cb46e16e63ff60fa63b760953560ceef45a621a7fea2c, exitCode=143, finishedAt=2025-11-27T04:35:40Z, message=null, reason=Error, signal=null, startedAt=2025-11-27T04:34:48Z, additionalProperties={}), waiting=null, additionalProperties={})] 04:35:41 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-gs5bk Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:35:41 | DEBUG | ProcessesListeningOnPorts | Kubernetes | 0/1 are in the ready state for tcp-connection-target-1 04:35:41 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: busybox-bypass 04:35:41 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: bypass annotation, bypassable PASSED AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: nginx w/ inline scan STANDARD_OUT 04:35:41 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Config: nginx w/ inline scan 04:35:41 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - centos7-base PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - fedora-6fb84ba634fe68572a2ac99741062695db24b921d0aa72e61ee669902f88c187 STANDARD_OUT 04:35:41 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - fedora-6fb84ba634fe68572a2ac99741062695db24b921d0aa72e61ee669902f88c187 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-1 to start 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-1's pods: 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-gs5bk Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:35:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-1 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 3 seconds for k8s deployment tcp-connection-target-1 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-1 with 1 pods 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-2 to start 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-2's pods: 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-2-6f4fbcc974-98mxq Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:35:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-2 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target-2 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-2 with 1 pods 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-3 to start 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-3's pods: 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-3-767d5fbfd-52cn4 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:35:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-3-767d5fbfd-zd8qf Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:34:51Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-3 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target-3 04:35:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-3 with 2 pods 04:35:44 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-1 within 0s 04:35:44 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-2 within 0s 04:35:44 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-3 within 0s 04:35:44 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:44 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 4 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1764218121 nanos: 622541789 } 04:35:44 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - fedora-6fb84ba634fe68572a2ac99741062695db24b921d0aa72e61ee669902f88c187 PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - nginx-1-9 STANDARD_OUT 04:35:44 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - nginx-1-9 04:35:45 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:46 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_0(AdmissionControllerTest.groovy:170) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:35:46 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Config: #desc > Verify Admission Controller Config: nginx w/ inline scan PASSED AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: no bypass annotation, non-bypassable STANDARD_OUT 04:35:46 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement on Updates: no bypass annotation, non-bypassable 04:35:46 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:47 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:48 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:48 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, e28d4e2c-32c0-47b9-b79d-4aebffc344d7, pb-deploymentnginx-lock within 0s 04:35:48 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Baseline Before after observation: id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:e28d4e2c-32c0-47b9-b79d-4aebffc344d7:pb-deploymentnginx-lock" key { deployment_id: "e28d4e2c-32c0-47b9-b79d-4aebffc344d7" container_name: "pb-deploymentnginx-lock" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1764218088 nanos: 353253300 } stack_rox_locked_timestamp { seconds: 1764218148 nanos: 353253500 } last_update { seconds: 1764218100 nanos: 617593096 } 04:35:49 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:49 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 5 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1764218121 nanos: 622541789 } 04:35:50 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:50 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - nginx-1-9 PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - nginx-1-17-1 STANDARD_OUT 04:35:50 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - nginx-1-17-1 04:35:51 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace busybox-no-bypass 04:35:51 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment busybox-no-bypass with version 39482 found in namespace qa-admission-controller-test. Updating... 04:35:51 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-no-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy:212) at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_1(AdmissionControllerTest.groovy:224) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:35:51 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: busybox-no-bypass 04:35:51 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: no bypass annotation, non-bypassable PASSED AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: bypass annotation, non-bypassable STANDARD_OUT 04:35:51 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement on Updates: bypass annotation, non-bypassable 04:35:51 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:52 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:53 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:54 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:54 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - nginx-1-17-1 PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - ubi9-slf4j STANDARD_OUT 04:35:54 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - ubi9-slf4j 04:35:54 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 6 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1764218121 nanos: 622541789 } 04:35:55 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:56 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace busybox-bypass 04:35:56 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:56 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment busybox-bypass with version 39536 found in namespace qa-admission-controller-test. Updating... 04:35:56 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'busybox-bypass' has image with tag 'latest' , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy:212) at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_1(AdmissionControllerTest.groovy:224) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:35:56 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: busybox-bypass 04:35:56 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: bypass annotation, non-bypassable PASSED AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: bypass annotation, bypassable STANDARD_OUT 04:35:56 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement on Updates: bypass annotation, bypassable 04:35:57 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:58 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:58 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-lock-7d54cc4c76-qcvw2 is running 04:35:58 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-lock-7d54cc4c76-qcvw2: [pwd] 04:35:58 | DEBUG | | Kubernetes | Command exited with 0 04:35:58 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:35:58 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:35:59 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:35:59 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 7 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() | | | "" id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1764218121 nanos: 622541789 } 04:36:00 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:01 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:01 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace busybox-bypass 04:36:01 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment busybox-bypass with version 39587 found in namespace qa-admission-controller-test. Updating... 04:36:01 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace busybox-bypass 04:36:01 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: busybox-bypass 04:36:01 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: bypass annotation, bypassable PASSED AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: nginx w/ inline scan STANDARD_OUT 04:36:01 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement on Updates: nginx w/ inline scan 04:36:02 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - ubi9-slf4j PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - apache-server STANDARD_OUT 04:36:02 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - apache-server 04:36:02 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:03 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:04 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:04 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:36:04 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | updated declarative role to be invalid in configMap 49454c22-4bca-40ef-adc2-64609645b062 04:36:04 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1764218161 nanos: 626271967 } 04:36:05 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:06 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:07 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:07 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Cleaning up deployment: objects.Deployment@74b8eb91 04:36:07 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-lock 04:36:07 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-lock: deployment removed. 04:36:07 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Verify processes risk indicators for the given key after lock on #deploymentName > Verify processes risk indicators for the given key after lock on pb-deploymentnginx-lock PASSED ProcessBaselinesTest > Verify baseline process violation after resolve baseline on #deploymentName > Verify baseline process violation after resolve baseline on pb-deploymentnginx-violation-resolve STANDARD_OUT 04:36:07 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Verify baseline process violation after resolve baseline on pb-deploymentnginx-violation-resolve 04:36:07 | DEBUG | ProcessBaselinesTest | OpenShift | Namespace qa-process-baselines already exists 04:36:07 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-violation-resolve 04:36:07 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-violation-resolve to start 04:36:07 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-violation-resolve's pods: 04:36:07 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-violation-resolve 04:36:08 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace scan-inline 04:36:08 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment scan-inline with version 39682 found in namespace qa-admission-controller-test. Updating... 04:36:08 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Fixable Severity at least Important (qa-admission-controller-test) - Description: ↳ Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important - Rationale: ↳ Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s). - Remediation: ↳ Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities. - Violations: - Fixable CVE-2017-1000408 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-1000409 (CVSS 7) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-12424 (CVSS 9.8) (severity Critical) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-16932 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2017-16997 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-18269 (CVSS 9.8) (severity Critical) found in component 'glibc' (version 2.24-11+deb9u3) in container 'scan-inline', resolved by version 2.24-11+deb9u4 - Fixable CVE-2017-20002 (CVSS 7.8) (severity Important) found in component 'shadow' (version 1:4.4-4.1) in container 'scan-inline', resolved by version 1:4.4-4.1+deb9u1 - Fixable CVE-2017-8872 (CVSS 9.1) (severity Critical) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2018-12015 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u4 - Fixable CVE-2018-12020 (CVSS 7.5) (severity Important) found in component 'gnupg2' (version 2.1.18-8~deb9u1) in container 'scan-inline', resolved by version 2.1.18-8~deb9u2 - Fixable CVE-2018-12900 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u5 - Fixable CVE-2018-15209 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-15686 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u10 - Fixable CVE-2018-15688 (CVSS 8.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u6 - Fixable CVE-2018-16335 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-16864 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-16865 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u7 - Fixable CVE-2018-17101 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-18311 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18312 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18313 (CVSS 9.1) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18314 (CVSS 9.8) (severity Critical) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u5 - Fixable CVE-2018-18557 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2018-20843 (CVSS 7.5) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u2 - Fixable CVE-2018-25009 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25010 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25011 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25012 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25013 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25014 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2018-25032 (CVSS 7.5) (severity Important) found in component 'zlib' (version 1:1.2.8.dfsg-5) in container 'scan-inline', resolved by version 1:1.2.8.dfsg-5+deb9u1 - Fixable CVE-2018-8905 (CVSS 8.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u4 - Fixable CVE-2019-11068 (CVSS 9.8) (severity Critical) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u1 - Fixable CVE-2019-18197 (CVSS 7.5) (severity Important) found in component 'libxslt' (version 1.1.29-2.1) in container 'scan-inline', resolved by version 1.1.29-2.1+deb9u2 - Fixable CVE-2019-19956 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-20367 (CVSS 9.1) (severity Critical) found in component 'libbsd' (version 0.8.3-1) in container 'scan-inline', resolved by version 0.8.3-1+deb9u1 - Fixable CVE-2019-20388 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2019-3462 (CVSS 8.1) (severity Important) found in component 'apt' (version 1.4.8) in container 'scan-inline', resolved by version 1.4.9 - Fixable CVE-2019-3842 (CVSS 7) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u11 - Fixable CVE-2019-6978 (CVSS 9.8) (severity Critical) found in component 'libgd2' (version 2.2.4-2+deb9u2) in container 'scan-inline', resolved by version 2.2.4-2+deb9u4 - Fixable CVE-2020-10531 (CVSS 8.8) (severity Important) found in component 'icu' (version 57.1-6+deb9u2) in container 'scan-inline', resolved by version 57.1-6+deb9u4 - Fixable CVE-2020-10543 (CVSS 8.2) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-10878 (CVSS 8.6) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-12723 (CVSS 7.5) (severity Important) found in component 'perl' (version 5.24.1-3+deb9u3) in container 'scan-inline', resolved by version 5.24.1-3+deb9u7 - Fixable CVE-2020-13790 (CVSS 8.1) (severity Important) found in component 'libjpeg-turbo' (version 1:1.5.1-2) in container 'scan-inline', resolved by version 1:1.5.1-2+deb9u1 - Fixable CVE-2020-14363 (CVSS 7.8) (severity Important) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u3 - Fixable CVE-2020-1712 (CVSS 7.8) (severity Important) found in component 'systemd' (version 232-25+deb9u3) in container 'scan-inline', resolved by version 232-25+deb9u14 - Fixable CVE-2020-19131 (CVSS 7.5) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u7 - Fixable CVE-2020-35523 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-35524 (CVSS 7.8) (severity Important) found in component 'tiff' (version 4.0.8-2+deb9u2) in container 'scan-inline', resolved by version 4.0.8-2+deb9u6 - Fixable CVE-2020-36328 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36329 (CVSS 9.8) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36330 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-36331 (CVSS 9.1) (severity Critical) found in component 'libwebp' (version 0.5.2-1) in container 'scan-inline', resolved by version 0.5.2-1+deb9u1 - Fixable CVE-2020-7595 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u3 - Fixable CVE-2021-23840 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u3 - Fixable CVE-2021-31535 (CVSS 9.8) (severity Critical) found in component 'libx11' (version 2:1.6.4-3) in container 'scan-inline', resolved by version 2:1.6.4-3+deb9u4 - Fixable CVE-2021-3516 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3517 (CVSS 8.6) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3518 (CVSS 8.8) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u4 - Fixable CVE-2021-3520 (CVSS 9.8) (severity Critical) found in component 'lz4' (version 0.0~r131-2) in container 'scan-inline', resolved by version 0.0~r131-2+deb9u1 - Fixable CVE-2021-3712 (CVSS 7.4) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u4 - Fixable CVE-2021-45960 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2021-46143 (CVSS 7.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-0778 (CVSS 7.5) (severity Important) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u5 - Fixable CVE-2022-1292 (CVSS 7.3) (severity Critical) found in component 'openssl' (version 1.1.0f-3+deb9u2) in container 'scan-inline', resolved by version 1.1.0l-1~deb9u6 - Fixable CVE-2022-1664 (CVSS 9.8) (severity Critical) found in component 'dpkg' (version 1.18.24) in container 'scan-inline', resolved by version 1.18.26 - Fixable CVE-2022-22822 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22823 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22824 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22825 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22826 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-22827 (CVSS 8.8) (severity Important) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-23308 (CVSS 7.5) (severity Important) found in component 'libxml2' (version 2.9.4+dfsg1-2.2+deb9u2) in container 'scan-inline', resolved by version 2.9.4+dfsg1-2.2+deb9u6 - Fixable CVE-2022-23852 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-23990 (CVSS 7.5) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u4 - Fixable CVE-2022-25235 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25236 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 - Fixable CVE-2022-25315 (CVSS 9.8) (severity Critical) found in component 'expat' (version 2.2.0-2+deb9u1) in container 'scan-inline', resolved by version 2.2.0-2+deb9u5 , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at jdk.internal.reflect.GeneratedMethodAccessor797.invoke(Unknown Source) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [8 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy:212) at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_1(AdmissionControllerTest.groovy:224) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:36:08 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: scan-inline 04:36:08 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement on Updates: #desc > Verify Admission Controller Enforcement on Updates: nginx w/ inline scan PASSED AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: false/false STANDARD_OUT 04:36:08 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: false/false 04:36:08 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:09 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:09 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 1 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1764218161 nanos: 626271967 } 04:36:10 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:10 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:10 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-violation-resolve to start 04:36:10 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-violation-resolve's pods: 04:36:10 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-violation-resolve-9bd5f87d-q2fqx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:36:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:36:10 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-violation-resolve 04:36:10 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-violation-resolve 04:36:10 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-violation-resolve with 1 pods 04:36:10 | INFO | ProcessBaselinesTest | Services | SR found deployment pb-deploymentnginx-violation-resolve within 0s 04:36:11 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, e4a990cb-9cd4-47bb-875c-9b0ccc7530b6, pb-deploymentnginx-violation-resolve within 0s 04:36:11 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 0 of 10): java.lang.RuntimeException: No processes in baseline for deployment e4a990cb-9cd4-47bb-875c-9b0ccc7530b6 yet. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:e4a990cb-9cd4-47bb-875c-9b0ccc7530b6:pb-deploymentnginx-violation-resolve" key { deployment_id: "e4a990cb-9cd4-47bb-875c-9b0ccc7530b6" container_name: "pb-deploymentnginx-violation-resolve" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } created { seconds: 1764218170 nanos: 990451393 } stack_rox_locked_timestamp { seconds: 1764218230 nanos: 990451613 } last_update { seconds: 1764218170 nanos: 990451393 } 04:36:11 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:12 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - apache-server PASSED ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - ubuntu-22.10-openssl STANDARD_OUT 04:36:12 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify image scan finds correct base OS - ubuntu-22.10-openssl 04:36:12 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:13 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:13 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace scoped-enforcement-false-false 04:36:13 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: scoped-enforcement-false-false 04:36:13 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: false/false PASSED AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: false/true STANDARD_OUT 04:36:13 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: false/true 04:36:14 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:14 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 2 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1764218161 nanos: 626271967 } 04:36:15 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify image scan finds correct base OS - #qaImageTag > Verify image scan finds correct base OS - ubuntu-22.10-openssl PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io] STANDARD_OUT 04:36:15 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io] 04:36:15 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:36:15 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:16 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [quay.io] 04:36:16 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:36:16 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:16 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io] PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng] STANDARD_OUT 04:36:16 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng] 04:36:17 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:36:17 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [quay.io/rhacs-eng] 04:36:17 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:36:17 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng] PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox] STANDARD_OUT 04:36:17 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox] 04:36:17 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:18 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:36:18 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [quay.io/rhacs-eng/qa-multi-arch-busybox] 04:36:18 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:36:18 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox] PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox:latest] STANDARD_OUT 04:36:18 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox:latest] 04:36:18 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:18 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:36:19 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [quay.io/rhacs-eng/qa-multi-arch-busybox:latest] 04:36:19 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:36:19 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace scoped-enforcement-false-true 04:36:19 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: scoped-enforcement-false-true 04:36:19 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox:latest] PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [other] STANDARD_OUT 04:36:19 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [other] 04:36:19 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: false/true PASSED AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: true/false STANDARD_OUT 04:36:19 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: true/false 04:36:19 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 3 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1764218161 nanos: 626271967 } 04:36:19 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:19 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:36:20 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [other] 04:36:20 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:36:20 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [other] PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox:1.30] STANDARD_OUT 04:36:20 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox:1.30] 04:36:20 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:36:20 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:20 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [quay.io/rhacs-eng/qa-multi-arch-busybox:1.30] 04:36:20 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:36:21 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, e4a990cb-9cd4-47bb-875c-9b0ccc7530b6, pb-deploymentnginx-violation-resolve within 0s 04:36:21 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Baseline Before locking: id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:e4a990cb-9cd4-47bb-875c-9b0ccc7530b6:pb-deploymentnginx-violation-resolve" key { deployment_id: "e4a990cb-9cd4-47bb-875c-9b0ccc7530b6" container_name: "pb-deploymentnginx-violation-resolve" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1764218170 nanos: 990451393 } stack_rox_locked_timestamp { seconds: 1764218230 nanos: 990451613 } last_update { seconds: 1764218179 nanos: 962360672 } 04:36:21 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [quay.io/rhacs-eng/qa-multi-arch-busybox:1.30] PASSED ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [rhacs-eng/qa-multi-arch-busybox:1.30] STANDARD_OUT 04:36:21 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [rhacs-eng/qa-multi-arch-busybox:1.30] 04:36:21 | INFO | ImageManagementTest | Services | Updated lifecycleStage of 'Latest tag - qa-image-management' to [BUILD, DEPLOY] 04:36:21 | INFO | ImageManagementTest | Services | Updated exclusions of 'Latest tag - qa-image-management' to [rhacs-eng/qa-multi-arch-busybox:1.30] 04:36:21 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=false 04:36:21 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint excluded scopes - #policyName - #excludedscopes > Verify CI/CD Integration Endpoint excluded scopes - Latest tag - [rhacs-eng/qa-multi-arch-busybox:1.30] PASSED ImageManagementTest > Verify lifecycle Stage can only be build time for policies with image criteria STANDARD_OUT 04:36:21 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify lifecycle Stage can only be build time for policies with image criteria 04:36:21 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:22 | WARN | ImageManagementTest | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: policy configuration is invalid for build time: generating evaluator for policy section "": compiling field query: &{CPU Cores Request [0.000000] Or false false}: invalid query: field CPU Cores Request unknown, excluding a deployment is only valid during the DEPLOY and RUNTIME lifecycles]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at ImageManagementTest.$spock_feature_1_4(ImageManagementTest.groovy:174) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:36:22 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify lifecycle Stage can only be build time for policies with image criteria PASSED ImageManagementTest > Verify risk is properly being attributed to scanned images STANDARD_OUT 04:36:22 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify risk is properly being attributed to scanned images 04:36:22 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify risk is properly being attributed to scanned images PASSED ImageManagementTest > Verify risk is properly being attributed to run images STANDARD_OUT 04:36:22 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify risk is properly being attributed to run images 04:36:22 | INFO | ImageManagementTest | OpenShift | Created namespace qa-image-management 04:36:22 | INFO | ImageManagementTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-image-management namespace. 04:36:22 | DEBUG | ImageManagementTest | Kubernetes | quay: secret created. 04:36:22 | DEBUG | ImageManagementTest | Kubernetes | default-dockercfg-tkj7v: secret created. 04:36:22 | DEBUG | ImageManagementTest | Kubernetes | redhat-image-pull-secret: secret created. 04:36:22 | DEBUG | ImageManagementTest | Kubernetes | public-dockerhub: secret created. 04:36:22 | DEBUG | ImageManagementTest | Kubernetes | gcr-image-pull-secret: secret created. 04:36:22 | DEBUG | ImageManagementTest | OpenShift | Adding system:serviceaccount:qa-image-management:default to anyuid user list 04:36:22 | DEBUG | ImageManagementTest | Kubernetes | Told the orchestrator to createOrReplace risk-image 04:36:22 | DEBUG | ImageManagementTest | Kubernetes | Waiting for risk-image to start 04:36:22 | DEBUG | ImageManagementTest | Kubernetes | Status of risk-image's pods: 04:36:22 | DEBUG | ImageManagementTest | Kubernetes | - risk-image-77bcfddbfc-4qqsc Container status: [] 04:36:22 | DEBUG | ImageManagementTest | Kubernetes | 0/1 are in the ready state for risk-image 04:36:22 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:23 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:24 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace scoped-enforcement-true-false 04:36:24 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: scoped-enforcement-true-false 04:36:24 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: true/false PASSED AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: true/true STANDARD_OUT 04:36:24 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: true/true 04:36:24 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 4 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1764218161 nanos: 626271967 } 04:36:24 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:25 | DEBUG | ImageManagementTest | Kubernetes | Waiting for risk-image to start 04:36:25 | DEBUG | ImageManagementTest | Kubernetes | Status of risk-image's pods: 04:36:25 | DEBUG | ImageManagementTest | Kubernetes | - risk-image-77bcfddbfc-4qqsc Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:36:23Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:36:25 | DEBUG | ImageManagementTest | Kubernetes | All 1 replicas found in ready state for risk-image 04:36:25 | DEBUG | ImageManagementTest | Kubernetes | Took 3 seconds for k8s deployment risk-image 04:36:25 | DEBUG | ImageManagementTest | Kubernetes | Updating deployment risk-image with 1 pods 04:36:25 | DEBUG | ImageManagementTest | Kubernetes | Removed the deployment: risk-image 04:36:25 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify risk is properly being attributed to run images PASSED ImageManagementTest > Verify CI/CD Integration Endpoint with notifications STANDARD_OUT 04:36:25 | INFO | ImageManagementTest | ImageManagementTest | Starting testcase: Verify CI/CD Integration Endpoint with notifications 04:36:26 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:26 | DEBUG | ImageManagementTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 04:36:26 | INFO | ImageManagementTest | Services | Request scan of quay.io/rhacs-eng/qa-multi-arch-busybox:latest with sendNotifications=true 04:36:26 | INFO | ImageManagementTest | ImageManagementTest | Most recent violation sent: [headers:[Accept-Encoding:[gzip], Authorization:[Basic YWRtaW46YWRtaW4=], Content-Length:[1491], Content-Type:[application/json], Headerkey:[headervalue], User-Agent:[Go-http-client/1.1]], data:[alert:[id:81396510-d5f4-4a69-8de3-69ab5ca57b4d, image:[id:sha256:907ca53d7e2947e849b839b1cd258c98fd3916c60f2e6e70c30edbf741ab6754, name:[fullName:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, registry:quay.io, remote:rhacs-eng/qa-multi-arch-busybox, tag:latest]], lifecycleStage:BUILD, policy:[SORTLifecycleStage:BUILD, SORTName:Latest tag - qa-image-management, categories:[DevOps Best Practices, Supply Chain Security], description:Alert on deployments with images using tag 'latest', id:a25106a1-c178-4ab2-9b78-b01f92b3389f, lastUpdated:2025-11-27T04:36:26.285910297Z, lifecycleStages:[BUILD], name:Latest tag - qa-image-management, notifiers:[8bba2a59-8ce0-4442-85ce-733351e872d4], policySections:[[policyGroups:[[fieldName:Image Tag, values:[[value:latest]]]]]], policyVersion:1.1, rationale:Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices., remediation:Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code., severity:LOW_SEVERITY], time:2025-11-27T04:36:26.392154882Z, violations:[[message:Image has tag 'latest']]], fieldkey:fieldvalue]] 04:36:26 | INFO | ImageManagementTest | ImageManagementTest | Ending testcase ImageManagementTest > Verify CI/CD Integration Endpoint with notifications PASSED ImageManagementTest STANDARD_OUT 04:36:26 | DEBUG | ImageManagementTest | Kubernetes | Waiting for namespace qa-image-management to be deleted 04:36:26 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:36:27 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:28 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:29 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:29 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:36:29 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 5 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1764218161 nanos: 626271967 } 04:36:30 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:30 | WARN | AdmissionControllerTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'scoped-enforcement-true-true' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'scoped-enforcement-true-true' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa-admission-controller-test/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'scoped-enforcement-true-true' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag (qa-admission-controller-test) - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'scoped-enforcement-true-true' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at jdk.internal.reflect.GeneratedMethodAccessor797.invoke(Unknown Source) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [8 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AdmissionControllerTest.$spock_feature_1_2(AdmissionControllerTest.groovy:287) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:36:30 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: #clusterMatch/#nsMatch > Verify Admission Controller Enforcement respects Cluster/Namespace scopes: match: true/true PASSED AdmissionControllerTest > Verify admission controller does not impair cluster operations when unstable STANDARD_OUT 04:36:30 | INFO | AdmissionControllerTest | AdmissionControllerTest | Starting testcase: Verify admission controller does not impair cluster operations when unstable 04:36:31 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-violation-resolve-9bd5f87d-q2fqx is running 04:36:31 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-violation-resolve-9bd5f87d-q2fqx: [pwd] 04:36:31 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:31 | DEBUG | | Kubernetes | Command exited with 0 04:36:31 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:36:31 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:36:31 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Locked Process Baseline after pwd: [id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:e4a990cb-9cd4-47bb-875c-9b0ccc7530b6:pb-deploymentnginx-violation-resolve" key { deployment_id: "e4a990cb-9cd4-47bb-875c-9b0ccc7530b6" container_name: "pb-deploymentnginx-violation-resolve" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1764218170 nanos: 990451393 } user_locked_timestamp { seconds: 1764218181 nanos: 35451184 } stack_rox_locked_timestamp { seconds: 1764218230 nanos: 990451613 } last_update { seconds: 1764218181 nanos: 35451355 } ] 04:36:31 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:36:31 | INFO | ProcessBaselinesTest | Services | violation size is: 1 04:36:31 | INFO | ProcessBaselinesTest | Services | Unauthorized Process Execution - qa-process-baselines triggered after waiting 0 seconds 04:36:31 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:36:31 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:36:32 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:32 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:36:33 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:34 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:34 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 6 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1764218161 nanos: 626271967 } 04:36:35 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:35 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-n6jw6, ready=true. 04:36:35 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-s2lpv, ready=true. 04:36:35 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-th42d, ready=true. 04:36:35 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-n6jw6. 04:36:35 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-s2lpv. 04:36:35 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-th42d. 04:36:35 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:36:36 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:36 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-22sxs, ready=false. 04:36:36 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-8hdsz, ready=false. 04:36:36 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bsw9x, ready=false. 04:36:36 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-n6jw6, ready=false. 04:36:36 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-s2lpv, ready=false. 04:36:36 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-th42d, ready=false. 04:36:36 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:37 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:37 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-22sxs, ready=false. 04:36:37 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-8hdsz, ready=false. 04:36:37 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bsw9x, ready=false. 04:36:37 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-n6jw6, ready=false. 04:36:37 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-s2lpv, ready=false. 04:36:37 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-th42d, ready=false. 04:36:37 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40107 found in namespace qa-admission-controller-test. Updating... 04:36:37 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:38 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:38 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:36:38 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-22sxs, ready=false. 04:36:38 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-8hdsz, ready=false. 04:36:38 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bsw9x, ready=false. 04:36:38 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-n6jw6, ready=false. 04:36:38 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40150 found in namespace qa-admission-controller-test. Updating... 04:36:38 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:39 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:39 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-22sxs, ready=false. 04:36:39 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-8hdsz, ready=false. 04:36:39 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bsw9x, ready=false. 04:36:39 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40177 found in namespace qa-admission-controller-test. Updating... 04:36:39 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:39 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 7 of 60): Condition not satisfied: roleHealth.getErrorMessage() | | | "" id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1764218161 nanos: 626271967 } 04:36:40 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:40 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-22sxs, ready=false. 04:36:40 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-8hdsz, ready=false. 04:36:40 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bsw9x, ready=false. 04:36:40 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40192 found in namespace qa-admission-controller-test. Updating... 04:36:40 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:41 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:41 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-violation-resolve-9bd5f87d-q2fqx is running 04:36:41 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-violation-resolve-9bd5f87d-q2fqx: [pwd] 04:36:41 | DEBUG | | Kubernetes | Command exited with 0 04:36:41 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:36:41 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:36:41 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:36:41 | INFO | ProcessBaselinesTest | Services | violation size is: 1 04:36:41 | INFO | ProcessBaselinesTest | Services | Unauthorized Process Execution - qa-process-baselines triggered after waiting 0 seconds 04:36:41 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:36:41 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:36:41 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-violation-resolve 04:36:41 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-violation-resolve: deployment removed. 04:36:41 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Verify baseline process violation after resolve baseline on #deploymentName > Verify baseline process violation after resolve baseline on pb-deploymentnginx-violation-resolve PASSED ProcessBaselinesTest > Verify baseline process violation after resolve baseline on #deploymentName > Verify baseline process violation after resolve baseline on pb-deploymentnginx-violation-resolve-baseline STANDARD_OUT 04:36:41 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Verify baseline process violation after resolve baseline on pb-deploymentnginx-violation-resolve-baseline 04:36:41 | DEBUG | ProcessBaselinesTest | OpenShift | Namespace qa-process-baselines already exists 04:36:41 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-violation-resolve-baseline 04:36:41 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-violation-resolve-baseline to start 04:36:41 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-violation-resolve-baseline's pods: 04:36:41 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-violation-resolve-baseline-64f955dcb-k6mv5 Container status: [] 04:36:41 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-violation-resolve-baseline 04:36:41 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:36:41 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-22sxs, ready=false. 04:36:41 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-8hdsz, ready=false. 04:36:41 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bsw9x, ready=false. 04:36:41 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40201 found in namespace qa-admission-controller-test. Updating... 04:36:42 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:42 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:42 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-22sxs, ready=false. 04:36:42 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-8hdsz, ready=false. 04:36:42 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bsw9x, ready=false. 04:36:43 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40234 found in namespace qa-admission-controller-test. Updating... 04:36:43 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:43 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:43 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-22sxs, ready=false. 04:36:43 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-8hdsz, ready=false. 04:36:43 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bsw9x, ready=false. 04:36:44 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40249 found in namespace qa-admission-controller-test. Updating... 04:36:44 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:44 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:44 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-violation-resolve-baseline to start 04:36:44 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-violation-resolve-baseline's pods: 04:36:44 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-violation-resolve-baseline-64f955dcb-k6mv5 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:36:42Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:36:44 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-violation-resolve-baseline 04:36:44 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-violation-resolve-baseline 04:36:44 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-violation-resolve-baseline with 1 pods 04:36:44 | INFO | ProcessBaselinesTest | Services | SR found deployment pb-deploymentnginx-violation-resolve-baseline within 0s 04:36:44 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, d9a3ff64-805d-4ef8-920a-927277f316fb, pb-deploymentnginx-violation-resolve-baseline within 0s 04:36:44 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 0 of 10): java.lang.RuntimeException: No processes in baseline for deployment d9a3ff64-805d-4ef8-920a-927277f316fb yet. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:d9a3ff64-805d-4ef8-920a-927277f316fb:pb-deploymentnginx-violation-resolve-baseline" key { deployment_id: "d9a3ff64-805d-4ef8-920a-927277f316fb" container_name: "pb-deploymentnginx-violation-resolve-baseline" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } created { seconds: 1764218204 nanos: 656250494 } stack_rox_locked_timestamp { seconds: 1764218264 nanos: 656250724 } last_update { seconds: 1764218204 nanos: 656250494 } 04:36:44 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:36:44 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-22sxs, ready=true. 04:36:44 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-8hdsz, ready=true. 04:36:44 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bsw9x, ready=true. 04:36:44 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-8hdsz. 04:36:45 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-bsw9x. 04:36:45 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-22sxs. 04:36:45 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:36:45 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | updated declarative auth provider to be invalid in configMap 49454c22-4bca-40ef-adc2-64609645b062 04:36:45 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1764218201 nanos: 691702980 } 04:36:45 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40273 found in namespace qa-admission-controller-test. Updating... 04:36:45 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:45 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:46 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-22sxs, ready=false. 04:36:46 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-52mcr, ready=false. 04:36:46 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-8hdsz, ready=false. 04:36:46 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bdd8t, ready=false. 04:36:46 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bsw9x, ready=false. 04:36:46 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-wqnqt, ready=false. 04:36:46 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40325 found in namespace qa-admission-controller-test. Updating... 04:36:46 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:46 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:47 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-22sxs, ready=false. 04:36:47 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-52mcr, ready=false. 04:36:47 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-8hdsz, ready=false. 04:36:47 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bdd8t, ready=false. 04:36:47 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bsw9x, ready=false. 04:36:47 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-wqnqt, ready=false. 04:36:47 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:47 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40367 found in namespace qa-admission-controller-test. Updating... 04:36:47 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:47 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:36:48 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-52mcr, ready=false. 04:36:48 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bdd8t, ready=false. 04:36:48 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-wqnqt, ready=false. 04:36:48 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:48 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40387 found in namespace qa-admission-controller-test. Updating... 04:36:48 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:49 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-52mcr, ready=false. 04:36:49 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bdd8t, ready=false. 04:36:49 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-wqnqt, ready=false. 04:36:49 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:49 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40404 found in namespace qa-admission-controller-test. Updating... 04:36:49 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:50 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 1 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1764218201 nanos: 691702980 } 04:36:50 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-52mcr, ready=false. 04:36:50 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bdd8t, ready=false. 04:36:50 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-wqnqt, ready=false. 04:36:50 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:50 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40416 found in namespace qa-admission-controller-test. Updating... 04:36:50 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:50 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:36:51 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-52mcr, ready=false. 04:36:51 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bdd8t, ready=false. 04:36:51 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-wqnqt, ready=false. 04:36:51 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:51 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40425 found in namespace qa-admission-controller-test. Updating... 04:36:51 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:52 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-52mcr, ready=false. 04:36:52 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bdd8t, ready=false. 04:36:52 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-wqnqt, ready=false. 04:36:52 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:52 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40438 found in namespace qa-admission-controller-test. Updating... 04:36:52 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:53 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-52mcr, ready=true. 04:36:53 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bdd8t, ready=false. 04:36:53 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-wqnqt, ready=true. 04:36:53 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-wqnqt. 04:36:53 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-52mcr. 04:36:53 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:53 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:36:53 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40446 found in namespace qa-admission-controller-test. Updating... 04:36:53 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:54 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:54 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-52mcr, ready=false. 04:36:54 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bdd8t, ready=true. 04:36:54 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bvmgz, ready=false. 04:36:54 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-g9z5m, ready=false. 04:36:54 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-wqnqt, ready=false. 04:36:54 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-bdd8t. 04:36:54 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, d9a3ff64-805d-4ef8-920a-927277f316fb, pb-deploymentnginx-violation-resolve-baseline within 0s 04:36:54 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Baseline Before locking: id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:d9a3ff64-805d-4ef8-920a-927277f316fb:pb-deploymentnginx-violation-resolve-baseline" key { deployment_id: "d9a3ff64-805d-4ef8-920a-927277f316fb" container_name: "pb-deploymentnginx-violation-resolve-baseline" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1764218204 nanos: 656250494 } stack_rox_locked_timestamp { seconds: 1764218264 nanos: 656250724 } last_update { seconds: 1764218208 nanos: 105223749 } 04:36:54 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40493 found in namespace qa-admission-controller-test. Updating... 04:36:55 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:55 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 2 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1764218201 nanos: 691702980 } 04:36:55 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:55 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-52mcr, ready=false. 04:36:55 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bdd8t, ready=false. 04:36:55 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bvmgz, ready=false. 04:36:55 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-g9z5m, ready=false. 04:36:55 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-ssdxh, ready=false. 04:36:55 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-wqnqt, ready=false. 04:36:56 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40537 found in namespace qa-admission-controller-test. Updating... 04:36:56 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:56 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:56 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bdd8t, ready=false. 04:36:56 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bvmgz, ready=false. 04:36:56 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-g9z5m, ready=false. 04:36:56 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-ssdxh, ready=false. 04:36:56 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:36:57 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40574 found in namespace qa-admission-controller-test. Updating... 04:36:57 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:57 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:57 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bvmgz, ready=false. 04:36:57 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-g9z5m, ready=false. 04:36:57 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-ssdxh, ready=false. 04:36:58 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40596 found in namespace qa-admission-controller-test. Updating... 04:36:58 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:58 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:58 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bvmgz, ready=false. 04:36:58 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-g9z5m, ready=false. 04:36:58 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-ssdxh, ready=false. 04:36:59 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40610 found in namespace qa-admission-controller-test. Updating... 04:36:59 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:36:59 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:36:59 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:36:59 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bvmgz, ready=false. 04:36:59 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-g9z5m, ready=false. 04:36:59 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-ssdxh, ready=false. 04:37:00 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 3 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1764218201 nanos: 691702980 } 04:37:00 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40617 found in namespace qa-admission-controller-test. Updating... 04:37:00 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:00 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:00 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bvmgz, ready=false. 04:37:00 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-g9z5m, ready=false. 04:37:00 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-ssdxh, ready=false. 04:37:01 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40628 found in namespace qa-admission-controller-test. Updating... 04:37:01 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:01 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:01 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bvmgz, ready=false. 04:37:01 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-g9z5m, ready=false. 04:37:01 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-ssdxh, ready=false. 04:37:02 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40644 found in namespace qa-admission-controller-test. Updating... 04:37:02 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:02 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:02 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:37:02 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bvmgz, ready=true. 04:37:02 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-g9z5m, ready=true. 04:37:02 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-ssdxh, ready=false. 04:37:02 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-bvmgz. 04:37:03 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-g9z5m. 04:37:03 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40665 found in namespace qa-admission-controller-test. Updating... 04:37:03 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:03 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:04 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bvmgz, ready=false. 04:37:04 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-g9z5m, ready=false. 04:37:04 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-nd6j5, ready=false. 04:37:04 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-ssdxh, ready=true. 04:37:04 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-zzx9v, ready=false. 04:37:04 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-ssdxh. 04:37:04 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:04 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-violation-resolve-baseline-64f955dcb-k6mv5 is running 04:37:04 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-violation-resolve-baseline-64f955dcb-k6mv5: [pwd] 04:37:04 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40712 found in namespace qa-admission-controller-test. Updating... 04:37:04 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:04 | DEBUG | | Kubernetes | Command exited with 0 04:37:04 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:37:04 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:37:04 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Locked Process Baseline after pwd: [id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:d9a3ff64-805d-4ef8-920a-927277f316fb:pb-deploymentnginx-violation-resolve-baseline" key { deployment_id: "d9a3ff64-805d-4ef8-920a-927277f316fb" container_name: "pb-deploymentnginx-violation-resolve-baseline" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1764218204 nanos: 656250494 } user_locked_timestamp { seconds: 1764218214 nanos: 692944153 } stack_rox_locked_timestamp { seconds: 1764218264 nanos: 656250724 } last_update { seconds: 1764218214 nanos: 692944343 } ] 04:37:04 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:37:04 | INFO | ProcessBaselinesTest | Services | violation size is: 1 04:37:04 | INFO | ProcessBaselinesTest | Services | Unauthorized Process Execution - qa-process-baselines triggered after waiting 0 seconds 04:37:04 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:37:04 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:37:05 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-bvmgz, ready=false. 04:37:05 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-g9z5m, ready=false. 04:37:05 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-lwkc9, ready=false. 04:37:05 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-nd6j5, ready=false. 04:37:05 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-ssdxh, ready=false. 04:37:05 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-zzx9v, ready=false. 04:37:05 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 4 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1764218201 nanos: 691702980 } 04:37:05 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:05 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40756 found in namespace qa-admission-controller-test. Updating... 04:37:05 | DEBUG | ImageManagementTest | Kubernetes | Retrying in 3... 04:37:05 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:06 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-g9z5m, ready=false. 04:37:06 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-lwkc9, ready=false. 04:37:06 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-nd6j5, ready=false. 04:37:06 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-ssdxh, ready=false. 04:37:06 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-zzx9v, ready=false. 04:37:06 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:06 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40789 found in namespace qa-admission-controller-test. Updating... 04:37:06 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:07 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-lwkc9, ready=false. 04:37:07 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-nd6j5, ready=false. 04:37:07 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-zzx9v, ready=false. 04:37:07 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:07 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40815 found in namespace qa-admission-controller-test. Updating... 04:37:08 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:08 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-lwkc9, ready=false. 04:37:08 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-nd6j5, ready=false. 04:37:08 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-zzx9v, ready=false. 04:37:08 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:08 | DEBUG | ImageManagementTest | Kubernetes | K8s found that namespace qa-image-management was deleted 04:37:08 | INFO | ImageManagementTest | ImageManagementTest | Ending testsuite 04:37:08 | INFO | ImageManagementTest | ImageManagementTest | Checking if cluster is healthy after test 04:37:08 | DEBUG | ImageManagementTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries 04:37:08 | DEBUG | ImageManagementTest | Helpers | Caught exception. Retrying in 3s (attempt 0 of 30): Condition not satisfied: status.overallHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | UNHEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-43-gd759b32efb" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: UNHEALTHY last_contact { seconds: 1764218198 nanos: 918869000 } health_info_complete: true admission_control_health_status: UNHEALTHY admission_control_health_info { total_desired_pods: 3 total_ready_pods: 0 } id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" scanner_health_info { total_desired_analyzer_pods: 1 total_ready_analyzer_pods: 1 total_desired_db_pods: 1 total_ready_db_pods: 1 } scanner_health_status: HEALTHY 04:37:09 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40829 found in namespace qa-admission-controller-test. Updating... 04:37:09 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:09 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-lwkc9, ready=false. 04:37:09 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-nd6j5, ready=false. 04:37:09 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-zzx9v, ready=false. 04:37:09 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:10 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40838 found in namespace qa-admission-controller-test. Updating... 04:37:10 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:10 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 5 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1764218201 nanos: 691702980 } 04:37:10 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-lwkc9, ready=false. 04:37:10 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-nd6j5, ready=false. 04:37:10 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-zzx9v, ready=false. 04:37:10 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:11 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40847 found in namespace qa-admission-controller-test. Updating... 04:37:11 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:11 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-lwkc9, ready=false. 04:37:11 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-nd6j5, ready=true. 04:37:11 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-zzx9v, ready=true. 04:37:11 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-zzx9v. 04:37:11 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-nd6j5. 04:37:11 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:11 | DEBUG | ImageManagementTest | Helpers | Caught exception. Retrying in 3s (attempt 1 of 30): Condition not satisfied: status.overallHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | UNHEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-43-gd759b32efb" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: UNHEALTHY last_contact { seconds: 1764218228 nanos: 919602000 } health_info_complete: true admission_control_health_status: UNHEALTHY admission_control_health_info { total_desired_pods: 3 total_ready_pods: 0 } id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" scanner_health_info { total_desired_analyzer_pods: 1 total_ready_analyzer_pods: 1 total_desired_db_pods: 1 total_ready_db_pods: 1 } scanner_health_status: HEALTHY 04:37:12 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40869 found in namespace qa-admission-controller-test. Updating... 04:37:12 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:12 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-lwkc9, ready=true. 04:37:12 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-nd6j5, ready=false. 04:37:12 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-pjfpj, ready=false. 04:37:12 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-spc7d, ready=false. 04:37:12 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-zzx9v, ready=false. 04:37:12 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-lwkc9. 04:37:12 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:13 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40928 found in namespace qa-admission-controller-test. Updating... 04:37:13 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:13 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-64299, ready=false. 04:37:13 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-lwkc9, ready=false. 04:37:13 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-nd6j5, ready=false. 04:37:13 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-pjfpj, ready=false. 04:37:13 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-spc7d, ready=false. 04:37:13 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-zzx9v, ready=false. 04:37:13 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:14 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40967 found in namespace qa-admission-controller-test. Updating... 04:37:14 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:14 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-64299, ready=false. 04:37:14 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-lwkc9, ready=false. 04:37:14 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-pjfpj, ready=false. 04:37:14 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-spc7d, ready=false. 04:37:14 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:14 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-violation-resolve-baseline-64f955dcb-k6mv5 is running 04:37:14 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-violation-resolve-baseline-64f955dcb-k6mv5: [pwd] 04:37:14 | DEBUG | ImageManagementTest | Helpers | Caught exception. Retrying in 3s (attempt 2 of 30): Condition not satisfied: status.overallHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | UNHEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-43-gd759b32efb" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: UNHEALTHY last_contact { seconds: 1764218228 nanos: 919602000 } health_info_complete: true admission_control_health_status: UNHEALTHY admission_control_health_info { total_desired_pods: 3 total_ready_pods: 0 } id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" scanner_health_info { total_desired_analyzer_pods: 1 total_ready_analyzer_pods: 1 total_desired_db_pods: 1 total_ready_db_pods: 1 } scanner_health_status: HEALTHY 04:37:15 | DEBUG | | Kubernetes | Command exited with 0 04:37:15 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:37:15 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:37:15 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:37:15 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 6 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1764218201 nanos: 691702980 } 04:37:15 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 40990 found in namespace qa-admission-controller-test. Updating... 04:37:15 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:15 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-64299, ready=false. 04:37:15 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-lwkc9, ready=false. 04:37:15 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-pjfpj, ready=false. 04:37:15 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-spc7d, ready=false. 04:37:15 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:16 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41005 found in namespace qa-admission-controller-test. Updating... 04:37:16 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:16 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-64299, ready=false. 04:37:16 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-pjfpj, ready=false. 04:37:16 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-spc7d, ready=false. 04:37:16 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:17 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41016 found in namespace qa-admission-controller-test. Updating... 04:37:17 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:17 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-64299, ready=false. 04:37:17 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-pjfpj, ready=false. 04:37:17 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-spc7d, ready=false. 04:37:17 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:18 | DEBUG | ImageManagementTest | Helpers | Caught exception. Retrying in 3s (attempt 3 of 30): Condition not satisfied: status.overallHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | UNHEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-43-gd759b32efb" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: UNHEALTHY last_contact { seconds: 1764218228 nanos: 919602000 } health_info_complete: true admission_control_health_status: UNHEALTHY admission_control_health_info { total_desired_pods: 3 total_ready_pods: 0 } id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" scanner_health_info { total_desired_analyzer_pods: 1 total_ready_analyzer_pods: 1 total_desired_db_pods: 1 total_ready_db_pods: 1 } scanner_health_status: HEALTHY 04:37:18 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:37:18 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41024 found in namespace qa-admission-controller-test. Updating... 04:37:18 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-64299, ready=false. 04:37:18 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-pjfpj, ready=false. 04:37:18 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-spc7d, ready=false. 04:37:18 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:18 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:19 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-64299, ready=false. 04:37:19 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-pjfpj, ready=false. 04:37:19 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-spc7d, ready=true. 04:37:19 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-spc7d. 04:37:19 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41035 found in namespace qa-admission-controller-test. Updating... 04:37:19 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:19 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:20 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 7 of 180): Condition not satisfied: authProviderHealth.getErrorMessage() | | | "" id: "ef53ca8f-bcf7-529d-8249-8befd36c8a7b" name: "declarative-config-test--auth-provider in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--auth-provider" resource_type: AUTH_PROVIDER last_timestamp { seconds: 1764218201 nanos: 691702980 } 04:37:20 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-64299, ready=false. 04:37:20 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-h8p6k, ready=false. 04:37:20 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-pjfpj, ready=true. 04:37:20 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-spc7d, ready=false. 04:37:20 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-pjfpj. 04:37:20 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41065 found in namespace qa-admission-controller-test. Updating... 04:37:21 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:21 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:21 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:37:21 | DEBUG | ImageManagementTest | Helpers | Caught exception. Retrying in 3s (attempt 4 of 30): Condition not satisfied: status.overallHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | UNHEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-43-gd759b32efb" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: UNHEALTHY last_contact { seconds: 1764218228 nanos: 919602000 } health_info_complete: true admission_control_health_status: UNHEALTHY admission_control_health_info { total_desired_pods: 3 total_ready_pods: 0 } id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" scanner_health_info { total_desired_analyzer_pods: 1 total_ready_analyzer_pods: 1 total_desired_db_pods: 1 total_ready_db_pods: 1 } scanner_health_status: HEALTHY 04:37:22 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-2qv6g, ready=false. 04:37:22 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-64299, ready=true. 04:37:22 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-h8p6k, ready=false. 04:37:22 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-pjfpj, ready=false. 04:37:22 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-spc7d, ready=false. 04:37:22 | INFO | | ChaosMonkey | Deleting pod admission-control-d77f6dd-64299. 04:37:22 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:22 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41098 found in namespace qa-admission-controller-test. Updating... 04:37:22 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:23 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:23 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-2qv6g, ready=false. 04:37:23 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-64299, ready=false. 04:37:23 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-h8p6k, ready=false. 04:37:23 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-pjfpj, ready=false. 04:37:23 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-sn2ts, ready=false. 04:37:23 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-spc7d, ready=false. 04:37:23 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41140 found in namespace qa-admission-controller-test. Updating... 04:37:23 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:24 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:37:24 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:24 | DEBUG | ImageManagementTest | Helpers | Caught exception. Retrying in 3s (attempt 5 of 30): Condition not satisfied: status.overallHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | UNHEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-43-gd759b32efb" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: UNHEALTHY last_contact { seconds: 1764218228 nanos: 919602000 } health_info_complete: true admission_control_health_status: UNHEALTHY admission_control_health_info { total_desired_pods: 3 total_ready_pods: 0 } id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" scanner_health_info { total_desired_analyzer_pods: 1 total_ready_analyzer_pods: 1 total_desired_db_pods: 1 total_ready_db_pods: 1 } scanner_health_status: HEALTHY 04:37:24 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-2qv6g, ready=false. 04:37:24 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-64299, ready=false. 04:37:24 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-h8p6k, ready=false. 04:37:24 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-pjfpj, ready=false. 04:37:24 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-sn2ts, ready=false. 04:37:24 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41164 found in namespace qa-admission-controller-test. Updating... 04:37:24 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:25 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:25 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-2qv6g, ready=false. 04:37:25 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-64299, ready=false. 04:37:25 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-h8p6k, ready=false. 04:37:25 | INFO | | ChaosMonkey | Encountered pod admission-control-d77f6dd-sn2ts, ready=false. 04:37:25 | DEBUG | AdmissionControllerTest | Kubernetes | Deployment random-busybox with version 41189 found in namespace qa-admission-controller-test. Updating... 04:37:25 | DEBUG | AdmissionControllerTest | Kubernetes | Told the orchestrator to createOrReplace random-busybox 04:37:26 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:27 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:37:27 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:27 | DEBUG | ImageManagementTest | Helpers | Caught exception. Retrying in 3s (attempt 6 of 30): Condition not satisfied: status.overallHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | UNHEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-43-gd759b32efb" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: UNHEALTHY last_contact { seconds: 1764218228 nanos: 919602000 } health_info_complete: true admission_control_health_status: UNHEALTHY admission_control_health_info { total_desired_pods: 3 total_ready_pods: 0 } id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" scanner_health_info { total_desired_analyzer_pods: 1 total_ready_analyzer_pods: 1 total_desired_db_pods: 1 total_ready_db_pods: 1 } scanner_health_status: HEALTHY 04:37:28 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:29 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:30 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:37:30 | INFO | ProcessBaselinesTest | Services | Failed to trigger Unauthorized Process Execution - qa-process-baselines after waiting 15 seconds 04:37:30 | DEBUG | ProcessBaselinesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:37:30 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-violation-resolve-baseline 04:37:30 | DEBUG | ImageManagementTest | Helpers | Caught exception. Retrying in 3s (attempt 7 of 30): Condition not satisfied: status.overallHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | UNHEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-43-gd759b32efb" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: UNHEALTHY last_contact { seconds: 1764218228 nanos: 919602000 } health_info_complete: true admission_control_health_status: UNHEALTHY admission_control_health_info { total_desired_pods: 3 total_ready_pods: 0 } id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" scanner_health_info { total_desired_analyzer_pods: 1 total_ready_analyzer_pods: 1 total_desired_db_pods: 1 total_ready_db_pods: 1 } scanner_health_status: HEALTHY 04:37:30 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:30 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-violation-resolve-baseline: deployment removed. 04:37:30 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Verify baseline process violation after resolve baseline on #deploymentName > Verify baseline process violation after resolve baseline on pb-deploymentnginx-violation-resolve-baseline PASSED ProcessBaselinesTest > Verify baselines are deleted when their deployment is deleted STANDARD_OUT 04:37:30 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Verify baselines are deleted when their deployment is deleted 04:37:30 | DEBUG | ProcessBaselinesTest | OpenShift | Namespace qa-process-baselines already exists 04:37:30 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-delete 04:37:30 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-delete to start 04:37:30 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-delete's pods: 04:37:30 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-delete-59967487b-zdqfq Container status: [] 04:37:30 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-delete 04:37:30 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap removed. 04:37:30 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | removed declarative configuration configMap 04:37:30 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateCleanupState with 60 retries 04:37:30 | DEBUG | DeclarativeConfigTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:37:30 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Get ConfigMap declarative-configurations from cluster 04:37:30 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 3s (attempt 0 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null 04:37:31 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:31 | INFO | AdmissionControllerTest | ChaosMonkey | ChaosMonkey: All admission control pod replicas ready: [admission-control-d77f6dd-2qv6g, admission-control-d77f6dd-h8p6k, admission-control-d77f6dd-sn2ts] 04:37:31 | DEBUG | AdmissionControllerTest | Kubernetes | Removed the deployment: random-busybox 04:37:31 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testcase AdmissionControllerTest > Verify admission controller does not impair cluster operations when unstable PASSED AdmissionControllerTest STANDARD_OUT 04:37:31 | DEBUG | AdmissionControllerTest | Kubernetes | Waiting for namespace qa-admission-controller-test to be deleted 04:37:31 | DEBUG | AdmissionControllerTest | Kubernetes | Retrying in 3... 04:37:32 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:33 | DEBUG | ImageManagementTest | Helpers | Caught exception. Retrying in 3s (attempt 8 of 30): Condition not satisfied: status.overallHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | UNHEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-43-gd759b32efb" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: UNHEALTHY last_contact { seconds: 1764218228 nanos: 919602000 } health_info_complete: true admission_control_health_status: UNHEALTHY admission_control_health_info { total_desired_pods: 3 total_ready_pods: 0 } id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" scanner_health_info { total_desired_analyzer_pods: 1 total_ready_analyzer_pods: 1 total_desired_db_pods: 1 total_ready_db_pods: 1 } scanner_health_status: HEALTHY 04:37:33 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:33 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-delete to start 04:37:33 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-delete's pods: 04:37:33 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-delete-59967487b-zdqfq Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:37:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:37:33 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-delete 04:37:33 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-delete 04:37:33 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-delete with 1 pods 04:37:33 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 2cd3f0b7-a5f5-4c45-ae56-5d65415a4e64, pb-deploymentnginx-delete within 0s 04:37:33 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-delete 04:37:33 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 3s (attempt 1 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null 04:37:34 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:34 | INFO | ProcessBaselinesTest | Services | SR does not detect the deployment pb-deploymentnginx-delete yet: io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id '2cd3f0b7-a5f5-4c45-ae56-5d65415a4e64' does not exist: not found 04:37:34 | WARN | ProcessBaselinesTest | ProcessBaselineService | Error getting process baselines io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id '"2cd3f0b7-a5f5-4c45-ae56-5d65415a4e64"' does not exist: not found at io.stackrox.proto.api.v1.ProcessBaselineServiceGrpc$ProcessBaselineServiceBlockingStub.getProcessBaseline(ProcessBaselineServiceGrpc.java:455) [3 skipped] at services.ProcessBaselineService.getBaselineProcesses(ProcessBaselineService.groovy:141) at services.ProcessBaselineService.getProcessBaseline(ProcessBaselineService.groovy:38) at services.ProcessBaselineService.getProcessBaseline(ProcessBaselineService.groovy) at services.ProcessBaselineService.waitForDeploymentBaselinesDeleted(ProcessBaselineService.groovy:172) at ProcessBaselinesTest.$spock_feature_1_2(ProcessBaselinesTest.groovy:312) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:37:34 | DEBUG | ProcessBaselinesTest | ProcessBaselineService | SR has not found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 2cd3f0b7-a5f5-4c45-ae56-5d65415a4e64, pb-deploymentnginx-delete yet 04:37:34 | DEBUG | AdmissionControllerTest | Kubernetes | Retrying in 3... 04:37:35 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:36 | DEBUG | ImageManagementTest | Helpers | Caught exception. Retrying in 3s (attempt 9 of 30): Condition not satisfied: status.overallHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | UNHEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-43-gd759b32efb" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: UNHEALTHY last_contact { seconds: 1764218228 nanos: 919602000 } health_info_complete: true admission_control_health_status: UNHEALTHY admission_control_health_info { total_desired_pods: 3 total_ready_pods: 0 } id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" scanner_health_info { total_desired_analyzer_pods: 1 total_ready_analyzer_pods: 1 total_desired_db_pods: 1 total_ready_db_pods: 1 } scanner_health_status: HEALTHY 04:37:36 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:36 | WARN | DeclarativeConfigTest | DeclarativeConfigTest | Failed to get ConfigMap declarative-configurations from cluster java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null at orchestratormanager.Kubernetes$_getConfigMap_closure66.doCall(Kubernetes.groovy:1809) at orchestratormanager.Kubernetes$_getConfigMap_closure66.call(Kubernetes.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at orchestratormanager.Kubernetes.getConfigMap(Kubernetes.groovy:1806) at DeclarativeConfigTest.outputAdditionalDebugInfo(DeclarativeConfigTest.groovy:862) [1 skipped] at DeclarativeConfigTest.cleanup(DeclarativeConfigTest.groovy:220) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$7(NodeTestTask.java:161) [14 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:161) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:37:36 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Get mounted files from ConfigMap declarative-configurations in central container 04:37:36 | DEBUG | DeclarativeConfigTest | Kubernetes | First container in pod central-675967bb95-7rkvx is running 04:37:36 | DEBUG | DeclarativeConfigTest | Kubernetes | Exec-ing the following command in pod central-675967bb95-7rkvx: [ls, -al, /run/stackrox.io/declarative-configuration/declarative-configurations/] 04:37:36 | DEBUG | | Kubernetes | Command exited with 0 04:37:36 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:37:36 | DEBUG | DeclarativeConfigTest | Kubernetes | Command status: SUCCESS Stdout: total 0 drwxrwsrwx. 3 root 4000 60 Nov 27 04:37 . drwxr-xr-t. 4 root root 84 Nov 27 04:27 .. drwxr-sr-x. 2 root 4000 6 Nov 27 04:37 ..2025_11_27_04_37_25.3735461998 lrwxrwxrwx. 1 root 4000 32 Nov 27 04:37 ..data -> ..2025_11_27_04_37_25.3735461998 Stderr: 04:37:37 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:37 | DEBUG | AdmissionControllerTest | Kubernetes | K8s found that namespace qa-admission-controller-test was deleted 04:37:37 | INFO | AdmissionControllerTest | AdmissionControllerTest | Ending testsuite 04:37:37 | INFO | AdmissionControllerTest | AdmissionControllerTest | Checking if cluster is healthy after test 04:37:37 | DEBUG | AdmissionControllerTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries 04:37:37 | DEBUG | AdmissionControllerTest | Helpers | Caught exception. Retrying in 3s (attempt 0 of 30): Condition not satisfied: status.overallHealthStatus == ClusterOuterClass.ClusterHealthStatus.HealthStatusLabel.HEALTHY | | | | | | UNHEALTHY | HEALTHY false | class io.stackrox.proto.storage.ClusterOuterClass$ClusterHealthStatus$HealthStatusLabel collector_health_info { version: "3.23.x-43-gd759b32efb" total_desired_pods: 6 total_ready_pods: 6 total_registered_nodes: 6 } sensor_health_status: HEALTHY collector_health_status: HEALTHY overall_health_status: UNHEALTHY last_contact { seconds: 1764218228 nanos: 919602000 } health_info_complete: true admission_control_health_status: UNHEALTHY admission_control_health_info { total_desired_pods: 3 total_ready_pods: 0 } id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" scanner_health_info { total_desired_analyzer_pods: 1 total_ready_analyzer_pods: 1 total_desired_db_pods: 1 total_ready_db_pods: 1 } scanner_health_status: HEALTHY 04:37:38 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries Gradle Test Executor 4 STANDARD_OUT 04:37:39 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:40 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: Service deleting... 04:37:40 | WARN | ProcessBaselinesTest | ProcessBaselineService | Error getting process baselines io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id '"2cd3f0b7-a5f5-4c45-ae56-5d65415a4e64"' does not exist: not found at io.stackrox.proto.api.v1.ProcessBaselineServiceGrpc$ProcessBaselineServiceBlockingStub.getProcessBaseline(ProcessBaselineServiceGrpc.java:455) [3 skipped] at services.ProcessBaselineService.getBaselineProcesses(ProcessBaselineService.groovy:141) at services.ProcessBaselineService.getProcessBaseline(ProcessBaselineService.groovy:38) at services.ProcessBaselineService.getProcessBaseline(ProcessBaselineService.groovy) at services.ProcessBaselineService.waitForDeploymentBaselinesDeleted(ProcessBaselineService.groovy:172) at ProcessBaselinesTest.$spock_feature_1_2(ProcessBaselinesTest.groovy:312) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:37:40 | DEBUG | ProcessBaselinesTest | ProcessBaselineService | SR has not found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 2cd3f0b7-a5f5-4c45-ae56-5d65415a4e64, pb-deploymentnginx-delete yet 04:37:40 | WARN | ProcessBaselinesTest | ProcessBaselineService | SR has not found process in baseline for the key in - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 2cd3f0b7-a5f5-4c45-ae56-5d65415a4e64, pb-deploymentnginx-delete 6 seconds 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: Service deleted 04:37:40 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-delete 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-1 04:37:40 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-delete: deployment removed. 04:37:40 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Verify baselines are deleted when their deployment is deleted PASSED ProcessBaselinesTest > Verify removed baseline process not getting added back to baseline after rerun on #deploymentName > Verify removed baseline process not getting added back to baseline after rerun on pb-deploymentnginx-removeprocess STANDARD_OUT 04:37:40 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Verify removed baseline process not getting added back to baseline after rerun on pb-deploymentnginx-removeprocess 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: deployment removed. 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: Service deleting... 04:37:40 | DEBUG | ProcessBaselinesTest | OpenShift | Namespace qa-process-baselines already exists 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: Service deleted 04:37:40 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-removeprocess 04:37:40 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-removeprocess to start 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-2 04:37:40 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-removeprocess's pods: 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: deployment removed. 04:37:40 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-removeprocess 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: Service deleting... 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: Service deleted 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-3 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: deployment removed. 04:37:40 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify networking endpoints disappear when process is terminated PASSED ProcessesListeningOnPortsTest > Verify networking endpoint doesn't disappear when port stays open STANDARD_OUT 04:37:40 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify networking endpoint doesn't disappear when port stays open 04:37:40 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1 service created 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-1 04:37:40 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2 service created Gradle Test Executor 4 STANDARD_OUT 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-2 04:37:40 | DEBUG | ProcessesListeningOnPorts | OpenShift | Namespace qa-plop already exists 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3 service created 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target-3 04:37:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-1 to start 04:37:41 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-1's pods: 04:37:41 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-gs5bk Container status: [ContainerState(running=null, terminated=ContainerStateTerminated(containerID=cri-o://ae898c8102130c2ab1e4d99b708e85cd5b5ee2023ca1738def97e6849d6545d0, exitCode=143, finishedAt=2025-11-27T04:37:40Z, message=null, reason=Error, signal=null, startedAt=2025-11-27T04:35:41Z, additionalProperties={}), waiting=null, additionalProperties={})] 04:37:41 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-qrvwv Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:37:41 | DEBUG | ProcessesListeningOnPorts | Kubernetes | 0/1 are in the ready state for tcp-connection-target-1 04:37:41 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap removed. 04:37:41 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateCleanupState with 60 retries 04:37:41 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Ending testcase DeclarativeConfigTest > Check successful creation, update, and deletion of declarative resources PASSED DeclarativeConfigTest > Check creating invalid configuration will not work STANDARD_OUT 04:37:41 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Starting testcase: Check creating invalid configuration will not work 04:37:41 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:37:41 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | created declarative configuration configMap 449241df-fdbe-4875-b9a5-04aef2326914 04:37:41 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateExpectedHealthStatus with 60 retries 04:37:41 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: health != null | | null false Expected unhealthy resource 'declarative-config-test--permission-set' not found in health status. Available resources: Config Map sensitive-declarative-configurations, Config Map declarative-configurations 04:37:43 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-removeprocess to start 04:37:43 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-removeprocess's pods: 04:37:43 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-removeprocess-857d57b5b6-7dw2q Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:37:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:37:43 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-removeprocess 04:37:43 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-removeprocess 04:37:43 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-removeprocess with 1 pods 04:37:43 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 57bb4141-38b2-4012-b2bf-2225c476aa39, pb-deploymentnginx-removeprocess within 0s 04:37:43 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 57bb4141-38b2-4012-b2bf-2225c476aa39, pb-deploymentnginx-removeprocess within 0s 04:37:43 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-removeprocess-857d57b5b6-7dw2q is running 04:37:43 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-removeprocess-857d57b5b6-7dw2q: [pwd] 04:37:43 | DEBUG | | Kubernetes | Command exited with 0 04:37:43 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:37:43 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:37:43 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 57bb4141-38b2-4012-b2bf-2225c476aa39, pb-deploymentnginx-removeprocess within 0s 04:37:43 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-removeprocess 04:37:43 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-removeprocess: deployment removed. 04:37:43 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Verify removed baseline process not getting added back to baseline after rerun on #deploymentName > Verify removed baseline process not getting added back to baseline after rerun on pb-deploymentnginx-removeprocess PASSED ProcessBaselinesTest > Delete process baselines via API STANDARD_OUT 04:37:43 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Delete process baselines via API 04:37:44 | DEBUG | ProcessBaselinesTest | OpenShift | Namespace qa-process-baselines already exists 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-1 to start 04:37:44 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-delete-api 04:37:44 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-delete-api to start 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-1's pods: 04:37:44 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-delete-api's pods: 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-1-56cb49cbdb-qrvwv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:37:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-1 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 3 seconds for k8s deployment tcp-connection-target-1 04:37:44 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-delete-api-769bf64b9b-pbrgg Container status: [] 04:37:44 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-delete-api 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-1 with 1 pods 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-2 to start 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-2's pods: 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-2-6f4fbcc974-s7p5l Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:37:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-2 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target-2 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-2 with 1 pods 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for tcp-connection-target-3 to start 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Status of tcp-connection-target-3's pods: 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-3-767d5fbfd-52cn4 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:35:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | - tcp-connection-target-3-767d5fbfd-l5756 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:37:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | All 1 replicas found in ready state for tcp-connection-target-3 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target-3 04:37:44 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Updating deployment tcp-connection-target-3 with 2 pods 04:37:44 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-1 within 0s 04:37:44 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-2 within 0s 04:37:44 | INFO | ProcessesListeningOnPorts | Services | SR found deployment tcp-connection-target-3 within 0s 04:37:44 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:45 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:46 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:47 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-delete-api to start 04:37:47 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-delete-api's pods: 04:37:47 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-delete-api-769bf64b9b-pbrgg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:37:44Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:37:47 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-delete-api 04:37:47 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-delete-api 04:37:47 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-delete-api with 1 pods 04:37:47 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 8fb33071-7303-4a5f-99ff-7504ef3f0168, pb-deploymentnginx-delete-api within 0s 04:37:47 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 8fb33071-7303-4a5f-99ff-7504ef3f0168, pb-deploymentnginx-delete-api within 0s 04:37:47 | DEBUG | ProcessBaselinesTest | Helpers | Attempt 1 failed, retrying 04:37:47 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:48 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:49 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:50 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:51 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:51 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap removed. 04:37:51 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | removed declarative configuration configMap 04:37:51 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateCleanupState with 60 retries 04:37:51 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Get ConfigMap declarative-configurations from cluster 04:37:51 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 3s (attempt 0 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null 04:37:52 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 8fb33071-7303-4a5f-99ff-7504ef3f0168, pb-deploymentnginx-delete-api within 0s 04:37:52 | DEBUG | ProcessBaselinesTest | Helpers | Attempt 2 failed, retrying 04:37:52 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:53 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:54 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:54 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 3s (attempt 1 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null 04:37:55 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:56 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:57 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 8fb33071-7303-4a5f-99ff-7504ef3f0168, pb-deploymentnginx-delete-api within 0s 04:37:57 | DEBUG | ProcessBaselinesTest | Helpers | Attempt 3 failed, retrying 04:37:57 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:57 | WARN | DeclarativeConfigTest | DeclarativeConfigTest | Failed to get ConfigMap declarative-configurations from cluster java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null at orchestratormanager.Kubernetes$_getConfigMap_closure66.doCall(Kubernetes.groovy:1809) at orchestratormanager.Kubernetes$_getConfigMap_closure66.call(Kubernetes.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at orchestratormanager.Kubernetes.getConfigMap(Kubernetes.groovy:1806) at DeclarativeConfigTest.outputAdditionalDebugInfo(DeclarativeConfigTest.groovy:862) [1 skipped] at DeclarativeConfigTest.cleanup(DeclarativeConfigTest.groovy:220) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$7(NodeTestTask.java:161) [14 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:161) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:37:57 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Get mounted files from ConfigMap declarative-configurations in central container 04:37:58 | DEBUG | DeclarativeConfigTest | Kubernetes | First container in pod central-675967bb95-7rkvx is running 04:37:58 | DEBUG | DeclarativeConfigTest | Kubernetes | Exec-ing the following command in pod central-675967bb95-7rkvx: [ls, -al, /run/stackrox.io/declarative-configuration/declarative-configurations/] 04:37:58 | DEBUG | | Kubernetes | Command exited with 0 04:37:58 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:37:58 | DEBUG | DeclarativeConfigTest | Kubernetes | Command status: SUCCESS Stdout: total 0 drwxrwsrwx. 3 root 4000 60 Nov 27 04:37 . drwxr-xr-t. 4 root root 84 Nov 27 04:27 .. drwxr-sr-x. 2 root 4000 6 Nov 27 04:37 ..2025_11_27_04_37_47.1264213640 lrwxrwxrwx. 1 root 4000 32 Nov 27 04:37 ..data -> ..2025_11_27_04_37_47.1264213640 Stderr: 04:37:58 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:37:59 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:38:00 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:38:01 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:38:02 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 8fb33071-7303-4a5f-99ff-7504ef3f0168, pb-deploymentnginx-delete-api within 0s 04:38:02 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | ID: 8fb33071-7303-4a5f-99ff-7504ef3f0168 04:38:02 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 8fb33071-7303-4a5f-99ff-7504ef3f0168, pb-deploymentnginx-delete-api within 0s 04:38:02 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | baselineBeforeDelete processes [/usr/sbin/nginx] 04:38:02 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-delete-api 04:38:02 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-delete-api: deployment removed. 04:38:02 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Delete process baselines via API PASSED ProcessBaselinesTest > Processes come in after baseline deleted by API for #deploymentName > Processes come in after baseline deleted by API for pb-deploymentnginx-post-delete-api STANDARD_OUT 04:38:02 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Starting testcase: Processes come in after baseline deleted by API for pb-deploymentnginx-post-delete-api 04:38:02 | DEBUG | ProcessBaselinesTest | OpenShift | Namespace qa-process-baselines already exists 04:38:02 | DEBUG | ProcessBaselinesTest | Kubernetes | Told the orchestrator to createOrReplace pb-deploymentnginx-post-delete-api 04:38:02 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-post-delete-api to start 04:38:02 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-post-delete-api's pods: 04:38:02 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-post-delete-api-5cdf57d6b6-m2tng Container status: [] 04:38:02 | DEBUG | ProcessBaselinesTest | Kubernetes | 0/1 are in the ready state for pb-deploymentnginx-post-delete-api 04:38:02 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:38:03 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap removed. 04:38:03 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateCleanupState with 60 retries 04:38:03 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Ending testcase DeclarativeConfigTest > Check creating invalid configuration will not work PASSED DeclarativeConfigTest > Check orphaned declarative resources are correctly handled STANDARD_OUT 04:38:03 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Starting testcase: Check orphaned declarative resources are correctly handled 04:38:03 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:38:03 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | created declarative configuration configMap 0db5e86d-bfe2-4951-b87f-b0668d47ac32 04:38:03 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateExpectedHealthStatus with 60 retries 04:38:03 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: health != null | | null false Expected resource 'declarative-config-test--permission-set' not found in health status. Available resources: Config Map sensitive-declarative-configurations, Config Map declarative-configurations 04:38:03 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:38:04 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:38:05 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for pb-deploymentnginx-post-delete-api to start 04:38:05 | DEBUG | ProcessBaselinesTest | Kubernetes | Status of pb-deploymentnginx-post-delete-api's pods: 04:38:05 | DEBUG | ProcessBaselinesTest | Kubernetes | - pb-deploymentnginx-post-delete-api-5cdf57d6b6-m2tng Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:38:03Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:38:05 | DEBUG | ProcessBaselinesTest | Kubernetes | All 1 replicas found in ready state for pb-deploymentnginx-post-delete-api 04:38:05 | DEBUG | ProcessBaselinesTest | Kubernetes | Took 3 seconds for k8s deployment pb-deploymentnginx-post-delete-api 04:38:05 | DEBUG | ProcessBaselinesTest | Kubernetes | Updating deployment pb-deploymentnginx-post-delete-api with 1 pods 04:38:05 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-post-delete-api-5cdf57d6b6-m2tng is running 04:38:05 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-post-delete-api-5cdf57d6b6-m2tng: [ls] 04:38:05 | DEBUG | | Kubernetes | Command exited with 0 04:38:05 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:38:05 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: bin boot dev etc home lib lib64 media mnt opt proc root run sbin srv sys tmp usr var Stderr: 04:38:05 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:38:05 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 0 of 10): java.lang.RuntimeException: Baseline objects.Deployment@45e62b70 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:9d9b77a5-056b-4a7f-9b19-c9e5548674e8:pb-deploymentnginx-post-delete-api" key { deployment_id: "9d9b77a5-056b-4a7f-9b19-c9e5548674e8" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1764218285 nanos: 569587100 } stack_rox_locked_timestamp { seconds: 1764218345 nanos: 569587309 } last_update { seconds: 1764218285 nanos: 569587100 } . 04:38:05 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:38:06 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:38:07 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:38:08 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:38:08 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | trying to remove the declarative permission set with configMap 0db5e86d-bfe2-4951-b87f-b0668d47ac32 04:38:08 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage().contains("referenced by another object") | | | | "" false id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1764218286 nanos: 631603626 } 04:38:08 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:38:09 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:38:10 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:38:13 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:38:13 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | restored a valid declarative permission set with configMap 0db5e86d-bfe2-4951-b87f-b0668d47ac32 04:38:13 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: permissionSetHealth.getErrorMessage() == "" | | | | | false | | 105 differences (0% similarity) | | (cannot delete permission set in use by role "declarative-config-test--role": referenced by another object) | | (---------------------------------------------------------------------------------------------------------) | cannot delete permission set in use by role "declarative-config-test--role": referenced by another object id: "ecd0e40e-eb14-54fc-925a-50ea0e92b84d" name: "declarative-config-test--permission-set in config map declarative-configurations" error_message: "cannot delete permission set in use by role \"declarative-config-test--role\": referenced by another object" resource_name: "declarative-config-test--permission-set" resource_type: PERMISSION_SET last_timestamp { seconds: 1764218291 nanos: 745962880 } 04:38:15 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:38:15 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 1 of 10): java.lang.RuntimeException: Baseline objects.Deployment@45e62b70 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:9d9b77a5-056b-4a7f-9b19-c9e5548674e8:pb-deploymentnginx-post-delete-api" key { deployment_id: "9d9b77a5-056b-4a7f-9b19-c9e5548674e8" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1764218285 nanos: 569587100 } stack_rox_locked_timestamp { seconds: 1764218345 nanos: 569587309 } last_update { seconds: 1764218285 nanos: 569587100 } . 04:38:18 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:38:18 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | trying to remove the declarative access scope with configMap 0db5e86d-bfe2-4951-b87f-b0668d47ac32 04:38:18 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage().contains("referenced by another object") | | | | "" false id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1764218296 nanos: 615871274 } 04:38:23 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:38:23 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | restored a valid declarative access scope with configMap 0db5e86d-bfe2-4951-b87f-b0668d47ac32 04:38:23 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: accessScopeHealth.getErrorMessage() == "" | | | | | false | | 103 differences (0% similarity) | | (cannot delete access scope in use by role "declarative-config-test--role": referenced by another object) | | (-------------------------------------------------------------------------------------------------------) | cannot delete access scope in use by role "declarative-config-test--role": referenced by another object id: "52433b24-5182-5044-abba-e2f146559df3" name: "declarative-config-test--access-scope in config map declarative-configurations" error_message: "cannot delete access scope in use by role \"declarative-config-test--role\": referenced by another object" resource_name: "declarative-config-test--access-scope" resource_type: ACCESS_SCOPE last_timestamp { seconds: 1764218301 nanos: 835809928 } 04:38:25 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:38:25 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 2 of 10): java.lang.RuntimeException: Baseline objects.Deployment@45e62b70 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:9d9b77a5-056b-4a7f-9b19-c9e5548674e8:pb-deploymentnginx-post-delete-api" key { deployment_id: "9d9b77a5-056b-4a7f-9b19-c9e5548674e8" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1764218285 nanos: 569587100 } stack_rox_locked_timestamp { seconds: 1764218345 nanos: 569587309 } last_update { seconds: 1764218301 nanos: 256068615 } . 04:38:28 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | found auth provider ef53ca8f-bcf7-529d-8249-8befd36c8a7b for declarative-config-test--auth-provider 04:38:28 | DEBUG | DeclarativeConfigTest | Helpers | Calling services.GroupService.createGroup with 3 retries 04:38:28 | DEBUG | DeclarativeConfigTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:38:28 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | found newly created auth provider group io.stackrox.authz.group.5e0b5e37-1e4b-40a2-bc37-96f25aa95498 04:38:28 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:38:28 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | trying to remove the declarative role with configMap 0db5e86d-bfe2-4951-b87f-b0668d47ac32 04:38:28 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: roleHealth.getErrorMessage().contains("is referenced by groups") | | | | "" false id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" status: HEALTHY resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1764218306 nanos: 628464790 } 04:38:33 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:38:33 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | restored a valid declarative role with configMap 0db5e86d-bfe2-4951-b87f-b0668d47ac32 04:38:33 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: roleHealth.getErrorMessage() == "" | | | | | false | | 186 differences (0% similarity) | | (role declarative-config-test--role is referenced by groups [io.stackrox.authz.group.5e0b5e37-1e4b-40a2-bc37-96f25aa95498] in auth providers, ensure all references to the role are removed) | | (------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------) | role declarative-config-test--role is referenced by groups [io.stackrox.authz.group.5e0b5e37-1e4b-40a2-bc37-96f25aa95498] in auth providers, ensure all references to the role are removed id: "2c0293cd-2da4-5178-a4cb-99b17b75ed1c" name: "declarative-config-test--role in config map declarative-configurations" error_message: "role declarative-config-test--role is referenced by groups [io.stackrox.authz.group.5e0b5e37-1e4b-40a2-bc37-96f25aa95498] in auth providers, ensure all references to the role are removed" resource_name: "declarative-config-test--role" resource_type: ROLE last_timestamp { seconds: 1764218311 nanos: 705250333 } 04:38:35 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:38:35 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 3 of 10): java.lang.RuntimeException: Baseline objects.Deployment@45e62b70 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:9d9b77a5-056b-4a7f-9b19-c9e5548674e8:pb-deploymentnginx-post-delete-api" key { deployment_id: "9d9b77a5-056b-4a7f-9b19-c9e5548674e8" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1764218285 nanos: 569587100 } stack_rox_locked_timestamp { seconds: 1764218345 nanos: 569587309 } last_update { seconds: 1764218301 nanos: 256068615 } . 04:38:39 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap created. 04:38:39 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | trying to remove the declarative auth provider with configMap 0db5e86d-bfe2-4951-b87f-b0668d47ac32 04:38:39 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateExpectedHealthStatus with 60 retries 04:38:39 | DEBUG | DeclarativeConfigTest | Helpers | Calling services.GroupService.getGroup with 3 retries 04:38:39 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 5s (attempt 0 of 60): Condition not satisfied: thrown | false Expected imperative group to be deleted when auth provider is removed, but group still exists 04:38:44 | DEBUG | DeclarativeConfigTest | Helpers | Calling services.GroupService.getGroup with 3 retries 04:38:44 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: NOT_FOUND: could not find group io.stackrox.authz.group.5e0b5e37-1e4b-40a2-bc37-96f25aa95498 04:38:45 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: NOT_FOUND: could not find group io.stackrox.authz.group.5e0b5e37-1e4b-40a2-bc37-96f25aa95498 04:38:45 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:38:45 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 4 of 10): java.lang.RuntimeException: Baseline objects.Deployment@45e62b70 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:9d9b77a5-056b-4a7f-9b19-c9e5548674e8:pb-deploymentnginx-post-delete-api" key { deployment_id: "9d9b77a5-056b-4a7f-9b19-c9e5548674e8" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1764218285 nanos: 569587100 } stack_rox_locked_timestamp { seconds: 1764218345 nanos: 569587309 } last_update { seconds: 1764218301 nanos: 256068615 } . 04:38:46 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: NOT_FOUND: could not find group io.stackrox.authz.group.5e0b5e37-1e4b-40a2-bc37-96f25aa95498 04:38:52 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap removed. 04:38:52 | DEBUG | DeclarativeConfigTest | DeclarativeConfigTest | removed declarative configuration configMap 04:38:52 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateCleanupState with 60 retries 04:38:52 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Get ConfigMap declarative-configurations from cluster 04:38:52 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 3s (attempt 0 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null 04:38:55 | DEBUG | DeclarativeConfigTest | Helpers | Caught exception. Retrying in 3s (attempt 1 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null 04:38:55 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:38:55 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 5 of 10): java.lang.RuntimeException: Baseline objects.Deployment@45e62b70 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:9d9b77a5-056b-4a7f-9b19-c9e5548674e8:pb-deploymentnginx-post-delete-api" key { deployment_id: "9d9b77a5-056b-4a7f-9b19-c9e5548674e8" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } elements { element { process_name: "/bin/ls" } auto: true } created { seconds: 1764218285 nanos: 569587100 } stack_rox_locked_timestamp { seconds: 1764218345 nanos: 569587309 } last_update { seconds: 1764218301 nanos: 256068615 } . 04:38:58 | WARN | DeclarativeConfigTest | DeclarativeConfigTest | Failed to get ConfigMap declarative-configurations from cluster java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.ConfigMap.getMetadata()" because "conf" is null at orchestratormanager.Kubernetes$_getConfigMap_closure66.doCall(Kubernetes.groovy:1809) at orchestratormanager.Kubernetes$_getConfigMap_closure66.call(Kubernetes.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at orchestratormanager.Kubernetes.getConfigMap(Kubernetes.groovy:1806) at DeclarativeConfigTest.outputAdditionalDebugInfo(DeclarativeConfigTest.groovy:862) [1 skipped] at DeclarativeConfigTest.cleanup(DeclarativeConfigTest.groovy:220) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$7(NodeTestTask.java:161) [14 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:161) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:38:58 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Get mounted files from ConfigMap declarative-configurations in central container 04:38:58 | DEBUG | DeclarativeConfigTest | Kubernetes | First container in pod central-675967bb95-7rkvx is running 04:38:58 | DEBUG | DeclarativeConfigTest | Kubernetes | Exec-ing the following command in pod central-675967bb95-7rkvx: [ls, -al, /run/stackrox.io/declarative-configuration/declarative-configurations/] 04:38:58 | DEBUG | | Kubernetes | Command exited with 0 04:38:58 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:38:58 | DEBUG | DeclarativeConfigTest | Kubernetes | Command status: SUCCESS Stdout: total 0 drwxrwsrwx. 3 root 4000 58 Nov 27 04:38 . drwxr-xr-t. 4 root root 84 Nov 27 04:27 .. drwxr-sr-x. 2 root 4000 6 Nov 27 04:38 ..2025_11_27_04_38_47.47935783 lrwxrwxrwx. 1 root 4000 30 Nov 27 04:38 ..data -> ..2025_11_27_04_38_47.47935783 Stderr: 04:39:03 | DEBUG | DeclarativeConfigTest | Kubernetes | declarative-configurations: ConfigMap removed. 04:39:03 | DEBUG | DeclarativeConfigTest | Helpers | Calling DeclarativeConfigTest.validateCleanupState with 60 retries 04:39:03 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Ending testcase DeclarativeConfigTest > Check orphaned declarative resources are correctly handled PASSED DeclarativeConfigTest STANDARD_OUT 04:39:03 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Ending testsuite 04:39:03 | INFO | DeclarativeConfigTest | DeclarativeConfigTest | Checking if cluster is healthy after test 04:39:03 | DEBUG | DeclarativeConfigTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries Gradle Test Executor 4 STANDARD_OUT 04:39:05 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:39:05 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:39:05 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:39:05 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 0 of 10): java.lang.RuntimeException: Baseline objects.Deployment@45e62b70 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:9d9b77a5-056b-4a7f-9b19-c9e5548674e8:pb-deploymentnginx-post-delete-api" key { deployment_id: "9d9b77a5-056b-4a7f-9b19-c9e5548674e8" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } created { seconds: 1764218285 nanos: 569587100 } stack_rox_locked_timestamp { seconds: 1764218405 nanos: 693682883 } last_update { seconds: 1764218345 nanos: 693684113 } . 04:39:15 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:39:15 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:39:15 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 1 of 10): java.lang.RuntimeException: Baseline objects.Deployment@45e62b70 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:9d9b77a5-056b-4a7f-9b19-c9e5548674e8:pb-deploymentnginx-post-delete-api" key { deployment_id: "9d9b77a5-056b-4a7f-9b19-c9e5548674e8" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } created { seconds: 1764218285 nanos: 569587100 } stack_rox_locked_timestamp { seconds: 1764218405 nanos: 693682883 } last_update { seconds: 1764218345 nanos: 693684113 } . 04:39:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: Service deleting... 04:39:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: Service deleted 04:39:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-1 04:39:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-1: deployment removed. 04:39:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: Service deleting... 04:39:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: Service deleted 04:39:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-2 04:39:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-2: deployment removed. 04:39:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: Service deleting... 04:39:15 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: Service deleted 04:39:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Removed the deployment: tcp-connection-target-3 04:39:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | tcp-connection-target-3: deployment removed. 04:39:16 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify networking endpoint doesn't disappear when port stays open PASSED ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported STANDARD_OUT 04:39:16 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify listening endpoints for collector are reported 04:39:16 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:39:16 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported PASSED ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported with pagination: #limit - #offset > Verify listening endpoints for collector are reported with pagination: 1 - 0 STANDARD_OUT 04:39:16 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify listening endpoints for collector are reported with pagination: 1 - 0 04:39:16 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:39:16 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported with pagination: #limit - #offset > Verify listening endpoints for collector are reported with pagination: 1 - 0 PASSED ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported with pagination: #limit - #offset > Verify listening endpoints for collector are reported with pagination: 1 - 1 STANDARD_OUT 04:39:16 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify listening endpoints for collector are reported with pagination: 1 - 1 04:39:16 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:39:16 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported with pagination: #limit - #offset > Verify listening endpoints for collector are reported with pagination: 1 - 1 PASSED ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported with pagination: #limit - #offset > Verify listening endpoints for collector are reported with pagination: 2 - 0 STANDARD_OUT 04:39:16 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Starting testcase: Verify listening endpoints for collector are reported with pagination: 2 - 0 04:39:16 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling services.ProcessesListeningOnPortsService.getProcessesListeningOnPortsResponse with 3 retries 04:39:16 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testcase ProcessesListeningOnPortsTest > Verify listening endpoints for collector are reported with pagination: #limit - #offset > Verify listening endpoints for collector are reported with pagination: 2 - 0 PASSED ProcessesListeningOnPortsTest STANDARD_OUT 04:39:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for namespace qa-plop to be deleted 04:39:16 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:19 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:22 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:25 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:25 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:39:25 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 2 of 10): java.lang.RuntimeException: Baseline objects.Deployment@45e62b70 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:9d9b77a5-056b-4a7f-9b19-c9e5548674e8:pb-deploymentnginx-post-delete-api" key { deployment_id: "9d9b77a5-056b-4a7f-9b19-c9e5548674e8" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } created { seconds: 1764218285 nanos: 569587100 } stack_rox_locked_timestamp { seconds: 1764218405 nanos: 693682883 } last_update { seconds: 1764218345 nanos: 693684113 } . 04:39:28 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:31 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:34 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:35 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:39:35 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 3 of 10): java.lang.RuntimeException: Baseline objects.Deployment@45e62b70 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:9d9b77a5-056b-4a7f-9b19-c9e5548674e8:pb-deploymentnginx-post-delete-api" key { deployment_id: "9d9b77a5-056b-4a7f-9b19-c9e5548674e8" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } created { seconds: 1764218285 nanos: 569587100 } stack_rox_locked_timestamp { seconds: 1764218405 nanos: 693682883 } last_update { seconds: 1764218345 nanos: 693684113 } . 04:39:37 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:40 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:43 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:45 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:39:45 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 4 of 10): java.lang.RuntimeException: Baseline objects.Deployment@45e62b70 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:9d9b77a5-056b-4a7f-9b19-c9e5548674e8:pb-deploymentnginx-post-delete-api" key { deployment_id: "9d9b77a5-056b-4a7f-9b19-c9e5548674e8" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } created { seconds: 1764218285 nanos: 569587100 } stack_rox_locked_timestamp { seconds: 1764218405 nanos: 693682883 } last_update { seconds: 1764218345 nanos: 693684113 } . 04:39:46 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:49 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:52 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:55 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:39:55 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:39:55 | DEBUG | ProcessBaselinesTest | Helpers | Caught exception. Retrying in 10s (attempt 5 of 10): java.lang.RuntimeException: Baseline objects.Deployment@45e62b70 is still in observation. Baseline is id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:9d9b77a5-056b-4a7f-9b19-c9e5548674e8:pb-deploymentnginx-post-delete-api" key { deployment_id: "9d9b77a5-056b-4a7f-9b19-c9e5548674e8" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } created { seconds: 1764218285 nanos: 569587100 } stack_rox_locked_timestamp { seconds: 1764218405 nanos: 693682883 } last_update { seconds: 1764218345 nanos: 693684113 } . 04:39:58 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Retrying in 3... 04:40:01 | DEBUG | ProcessesListeningOnPorts | Kubernetes | K8s found that namespace qa-plop was deleted 04:40:01 | DEBUG | ProcessesListeningOnPorts | Kubernetes | Waiting for namespace qa-plop to be deleted 04:40:01 | DEBUG | ProcessesListeningOnPorts | Kubernetes | K8s found that namespace qa-plop was deleted 04:40:01 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Ending testsuite 04:40:01 | INFO | ProcessesListeningOnPorts | ProcessesListeningOnPorts | Checking if cluster is healthy after test 04:40:01 | DEBUG | ProcessesListeningOnPorts | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries Gradle Test Executor 4 STANDARD_OUT 04:40:05 | INFO | ProcessBaselinesTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-process-baselines, 9d9b77a5-056b-4a7f-9b19-c9e5548674e8, pb-deploymentnginx-post-delete-api within 0s 04:40:05 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Process Baseline before pwd: id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa-process-baselines:9d9b77a5-056b-4a7f-9b19-c9e5548674e8:pb-deploymentnginx-post-delete-api" key { deployment_id: "9d9b77a5-056b-4a7f-9b19-c9e5548674e8" container_name: "pb-deploymentnginx-post-delete-api" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-process-baselines" } created { seconds: 1764218285 nanos: 569587100 } stack_rox_locked_timestamp { seconds: 1764218405 nanos: 693682883 } last_update { seconds: 1764218345 nanos: 693684113 } 04:40:15 | DEBUG | ProcessBaselinesTest | Kubernetes | First container in pod pb-deploymentnginx-post-delete-api-5cdf57d6b6-m2tng is running 04:40:15 | DEBUG | ProcessBaselinesTest | Kubernetes | Exec-ing the following command in pod pb-deploymentnginx-post-delete-api-5cdf57d6b6-m2tng: [pwd] 04:40:15 | DEBUG | | Kubernetes | Command exited with 0 04:40:15 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:40:15 | DEBUG | ProcessBaselinesTest | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:40:22 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Cleaning up deployment: objects.Deployment@45e62b70 04:40:22 | DEBUG | ProcessBaselinesTest | Kubernetes | Removed the deployment: pb-deploymentnginx-post-delete-api 04:40:22 | DEBUG | ProcessBaselinesTest | Kubernetes | pb-deploymentnginx-post-delete-api: deployment removed. 04:40:22 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testcase ProcessBaselinesTest > Processes come in after baseline deleted by API for #deploymentName > Processes come in after baseline deleted by API for pb-deploymentnginx-post-delete-api PASSED ProcessBaselinesTest STANDARD_OUT 04:40:22 | DEBUG | ProcessBaselinesTest | Kubernetes | Waiting for namespace qa-process-baselines to be deleted 04:40:22 | DEBUG | ProcessBaselinesTest | Kubernetes | Retrying in 3... 04:40:25 | DEBUG | ProcessBaselinesTest | Kubernetes | Retrying in 3... 04:40:28 | DEBUG | ProcessBaselinesTest | Kubernetes | Retrying in 3... 04:40:31 | DEBUG | ProcessBaselinesTest | Kubernetes | K8s found that namespace qa-process-baselines was deleted 04:40:31 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Ending testsuite 04:40:31 | INFO | ProcessBaselinesTest | ProcessBaselinesTest | Checking if cluster is healthy after test 04:40:31 | DEBUG | ProcessBaselinesTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries 04:40:31 | INFO | | BaseSpecification | Performing global shutdown 04:40:31 | INFO | | RoleService | Deleted role: Test Automation Role - 18049 and permission set 04:40:31 | INFO | | BaseSpecification | Removing core image registry integration 04:40:31 | DEBUG | | ImageIntegrationService | Image integration deleted: 5faf986d-3d04-4c7e-b330-b1e6117eeeb0 > Task :testRest AdmissionControllerNoImageScanTest > Verify Admission Controller Behavior for No Image Scans Policy SKIPPED AttemptedAlertsTest STANDARD_OUT 04:40:35 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testsuite 04:40:35 | INFO | AttemptedAlertsTest | BaseSpecification | Performing global setup 04:40:35 | DEBUG | AttemptedAlertsTest | Kubernetes | quay: secret created. 04:40:35 | DEBUG | AttemptedAlertsTest | Kubernetes | public-dockerhub: secret created. 04:40:36 | DEBUG | AttemptedAlertsTest | Kubernetes | gcr-image-pull-secret: secret created. 04:40:36 | DEBUG | AttemptedAlertsTest | Kubernetes | redhat-image-pull-secret: secret created. 04:40:36 | DEBUG | AttemptedAlertsTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:40:36 | INFO | AttemptedAlertsTest | BaseSpecification | Testing against: 04:40:36 | INFO | AttemptedAlertsTest | BaseSpecification | version: "4.10.x-442-g3e9694559e" build_flavor: "development" license_status: VALID 04:40:36 | INFO | AttemptedAlertsTest | BaseSpecification | isGKE: false 04:40:36 | INFO | AttemptedAlertsTest | BaseSpecification | isEKS: false 04:40:36 | INFO | AttemptedAlertsTest | BaseSpecification | isOpenShift4: true 04:40:36 | INFO | AttemptedAlertsTest | BaseSpecification | testTarget: test 04:40:37 | INFO | AttemptedAlertsTest | BaseSpecification | Adding core image registry integration 04:40:37 | DEBUG | AttemptedAlertsTest | ImageIntegrationService | Integration tested: core quay 04:40:37 | DEBUG | AttemptedAlertsTest | ImageIntegrationService | Integration created: core quay: 0196e12b-2836-4dad-8c63-620a56a6a662 04:40:37 | DEBUG | AttemptedAlertsTest | ImageIntegrationService | Integration found after creation: core quay: 0196e12b-2836-4dad-8c63-620a56a6a662 04:40:37 | DEBUG | AttemptedAlertsTest | OpenShift | Namespace qa already exists AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: no create enforce; policy enforce STANDARD_OUT 04:40:38 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment create: no create enforce; policy enforce 04:40:48 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:40:53 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-1 04:40:53 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:40:56 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:40:57 | INFO | AttemptedAlertsTest | Services | violation size is: 1 04:40:57 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 3 seconds 04:40:57 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:40:57 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: no create enforce; policy enforce PASSED AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: create enforce; policy enforce STANDARD_OUT 04:40:57 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment create: create enforce; policy enforce 04:41:07 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:41:12 | WARN | AttemptedAlertsTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AttemptedAlertsTest.$spock_feature_1_0(AttemptedAlertsTest.groovy:124) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:41:12 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:41:12 | INFO | AttemptedAlertsTest | Services | violation size is: 1 04:41:12 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:41:12 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:41:13 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: create enforce; policy enforce PASSED AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: create enforce; policy enforce; 2nd attempt STANDARD_OUT 04:41:13 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment create: create enforce; policy enforce; 2nd attempt 04:41:23 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:41:28 | WARN | AttemptedAlertsTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-2' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at AttemptedAlertsTest.$spock_feature_1_0(AttemptedAlertsTest.groovy:124) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:41:28 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:41:28 | INFO | AttemptedAlertsTest | Services | violation size is: 2 04:41:28 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:41:28 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:41:28 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: create enforce; policy enforce; 2nd attempt PASSED AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: no create enforce; policy enforce; 2nd attempt STANDARD_OUT 04:41:28 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment create: no create enforce; policy enforce; 2nd attempt 04:41:39 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:41:44 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-2 04:41:44 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:41:44 | INFO | AttemptedAlertsTest | Services | violation size is: 3 04:41:44 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:41:44 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:41:44 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: no create enforce; policy enforce; 2nd attempt PASSED AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: no enforcement STANDARD_OUT 04:41:44 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment create: no enforcement 04:41:54 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to have no enforcement actions 04:41:59 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-3 04:41:59 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:41:59 | INFO | AttemptedAlertsTest | Services | violation size is: 1 04:41:59 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:41:59 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:42:00 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: no enforcement PASSED AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: create enforce; no policy enforce STANDARD_OUT 04:42:00 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment create: create enforce; no policy enforce 04:42:10 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to have no enforcement actions 04:42:15 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-4 04:42:15 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:15 | INFO | AttemptedAlertsTest | Services | violation size is: 1 04:42:15 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:42:15 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:42:15 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment create: #desc > Verify attempted alerts on deployment create: create enforce; no policy enforce PASSED AttemptedAlertsTest > Verify attempted alerts on deployment updates: #desc > Verify attempted alerts on deployment updates: update enforce; policy enforce STANDARD_OUT 04:42:15 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment updates: update enforce; policy enforce 04:42:16 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-5 04:42:26 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:42:31 | DEBUG | AttemptedAlertsTest | Kubernetes | Deployment attempted-alerts-dep-5 with version 43747 found in namespace qa. Updating... 04:42:31 | WARN | AttemptedAlertsTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: PUT at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments/attempted-alerts-dep-5. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: PUT at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments/attempted-alerts-dep-5. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.replace(CreateOrReplaceHelper.java:74) [10 skipped] at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:66) at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy:212) at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy) at AttemptedAlertsTest.$spock_feature_1_1(AttemptedAlertsTest.groovy:204) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:42:31 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:31 | INFO | AttemptedAlertsTest | Services | violation size is: 1 04:42:31 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:42:31 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:42:31 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment updates: #desc > Verify attempted alerts on deployment updates: update enforce; policy enforce PASSED AttemptedAlertsTest > Verify attempted alerts on deployment updates: #desc > Verify attempted alerts on deployment updates: update enforce; policy enforce; 2nd attempt STANDARD_OUT 04:42:31 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment updates: update enforce; policy enforce; 2nd attempt 04:42:31 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-5 04:42:42 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:42:47 | DEBUG | AttemptedAlertsTest | Kubernetes | Deployment attempted-alerts-dep-5 with version 43821 found in namespace qa. Updating... 04:42:47 | WARN | AttemptedAlertsTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: PUT at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments/attempted-alerts-dep-5. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: PUT at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments/attempted-alerts-dep-5. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Latest tag - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'attempted-alerts-dep-5' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.replace(CreateOrReplaceHelper.java:74) [10 skipped] at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:66) at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [10 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy:212) at orchestratormanager.Kubernetes.updateDeploymentNoWait(Kubernetes.groovy) at AttemptedAlertsTest.$spock_feature_1_1(AttemptedAlertsTest.groovy:204) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:42:47 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:42:47 | INFO | AttemptedAlertsTest | Services | violation size is: 2 04:42:47 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:42:47 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:42:47 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment updates: #desc > Verify attempted alerts on deployment updates: update enforce; policy enforce; 2nd attempt PASSED AttemptedAlertsTest > Verify attempted alerts on deployment updates: #desc > Verify attempted alerts on deployment updates: no update enforce; policy enforce STANDARD_OUT 04:42:47 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Starting testcase: Verify attempted alerts on deployment updates: no update enforce; policy enforce 04:42:47 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-5 04:42:57 | INFO | AttemptedAlertsTest | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT] 04:43:03 | DEBUG | AttemptedAlertsTest | Kubernetes | Deployment attempted-alerts-dep-5 with version 43907 found in namespace qa. Updating... 04:43:03 | DEBUG | AttemptedAlertsTest | Kubernetes | Told the orchestrator to createOrReplace attempted-alerts-dep-5 04:43:03 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:03 | INFO | AttemptedAlertsTest | Services | violation size is: 3 04:43:03 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:43:03 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolation with 3 retries 04:43:03 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testcase AttemptedAlertsTest > Verify attempted alerts on deployment updates: #desc > Verify attempted alerts on deployment updates: no update enforce; policy enforce PASSED AttemptedAlertsTest STANDARD_OUT 04:43:03 | DEBUG | AttemptedAlertsTest | Kubernetes | Removed the deployment: attempted-alerts-dep-1 04:43:03 | DEBUG | AttemptedAlertsTest | Kubernetes | Removed the deployment: attempted-alerts-dep-2 04:43:03 | DEBUG | AttemptedAlertsTest | Kubernetes | Removed the deployment: attempted-alerts-dep-3 04:43:03 | DEBUG | AttemptedAlertsTest | Kubernetes | Removed the deployment: attempted-alerts-dep-4 04:43:03 | DEBUG | AttemptedAlertsTest | Kubernetes | Removed the deployment: attempted-alerts-dep-5 04:43:03 | DEBUG | AttemptedAlertsTest | Kubernetes | Removed the deployment: attempted-alerts-dep-6 04:43:03 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:03 | INFO | AttemptedAlertsTest | Services | violation size is: 4 04:43:03 | INFO | AttemptedAlertsTest | Services | Latest tag triggered after waiting 0 seconds 04:43:03 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:43:03 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:43:03 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:43:03 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:43:03 | DEBUG | AttemptedAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:03 | INFO | AttemptedAlertsTest | Services | Failed to trigger Kubernetes Actions: Exec into Pod after waiting 0 seconds 04:43:03 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Ending testsuite 04:43:03 | INFO | AttemptedAlertsTest | AttemptedAlertsTest | Checking if cluster is healthy after test 04:43:03 | DEBUG | AttemptedAlertsTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries AuditLogAlertsTest STANDARD_OUT 04:43:03 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testsuite AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: CREATE - SECRETS STANDARD_OUT 04:43:04 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify Audit Log Event Source Policies Trigger: CREATE - SECRETS 04:43:09 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez6f81240f-283c-4623-a60e-2118a61e0bfb: Secret created. 04:43:14 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez6f81240f-283c-4623-a60e-2118a61e0bfb: Secret removed. 04:43:14 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:14 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:43:14 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-CREATE-SECRETS triggered after waiting 0 seconds 04:43:14 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: CREATE - SECRETS PASSED AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: GET - SECRETS STANDARD_OUT 04:43:14 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify Audit Log Event Source Policies Trigger: GET - SECRETS 04:43:19 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez34a2b07f-334b-44ee-bdeb-35f358861681: Secret created. 04:43:24 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez34a2b07f-334b-44ee-bdeb-35f358861681: Secret removed. 04:43:24 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:24 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:43:24 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-GET-SECRETS triggered after waiting 0 seconds 04:43:25 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: GET - SECRETS PASSED AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: DELETE - SECRETS STANDARD_OUT 04:43:25 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify Audit Log Event Source Policies Trigger: DELETE - SECRETS 04:43:30 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez17dfe3b6-b0e8-461c-86d8-303b1595d0b9: Secret created. 04:43:35 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez17dfe3b6-b0e8-461c-86d8-303b1595d0b9: Secret removed. 04:43:35 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:35 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:43:35 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-DELETE-SECRETS triggered after waiting 0 seconds 04:43:35 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: DELETE - SECRETS PASSED AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: CREATE - CONFIGMAPS STANDARD_OUT 04:43:35 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify Audit Log Event Source Policies Trigger: CREATE - CONFIGMAPS 04:43:40 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rezef44a7eb-eb00-4daf-868f-7083bb1b99b2: ConfigMap created. 04:43:45 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rezef44a7eb-eb00-4daf-868f-7083bb1b99b2: ConfigMap removed. 04:43:45 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:45 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:43:45 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-CREATE-CONFIGMAPS triggered after waiting 0 seconds 04:43:46 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: CREATE - CONFIGMAPS PASSED AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: GET - CONFIGMAPS STANDARD_OUT 04:43:46 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify Audit Log Event Source Policies Trigger: GET - CONFIGMAPS 04:43:51 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez6bd49478-e0ba-4774-b998-635e6b83cdf2: ConfigMap created. 04:43:56 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez6bd49478-e0ba-4774-b998-635e6b83cdf2: ConfigMap removed. 04:43:56 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:43:56 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:43:56 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-GET-CONFIGMAPS triggered after waiting 0 seconds 04:43:56 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: GET - CONFIGMAPS PASSED AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: DELETE - CONFIGMAPS STANDARD_OUT 04:43:56 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify Audit Log Event Source Policies Trigger: DELETE - CONFIGMAPS 04:44:01 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-reze8e26140-cef4-4f02-8071-892b185c58c0: ConfigMap created. 04:44:06 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-reze8e26140-cef4-4f02-8071-892b185c58c0: ConfigMap removed. 04:44:06 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:44:06 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:44:06 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-DELETE-CONFIGMAPS triggered after waiting 0 seconds 04:44:06 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify Audit Log Event Source Policies Trigger: #verb - #resourceType > Verify Audit Log Event Source Policies Trigger: DELETE - CONFIGMAPS PASSED AuditLogAlertsTest > Verify collection continues when it is disabled and then re-enabled STANDARD_OUT 04:44:06 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify collection continues when it is disabled and then re-enabled 04:44:12 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez69d8123d-4fca-48ae-bf39-657ca35406f7: ConfigMap created. 04:44:17 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez69d8123d-4fca-48ae-bf39-657ca35406f7: ConfigMap removed. 04:44:17 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:44:17 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:44:17 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-GET-CONFIGMAPS triggered after waiting 0 seconds 04:44:17 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:44:27 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez69d8123d-4fca-48ae-bf39-657ca35406f7-2: ConfigMap created. 04:44:32 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez69d8123d-4fca-48ae-bf39-657ca35406f7-2: ConfigMap removed. 04:44:32 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:44:32 | INFO | AuditLogAlertsTest | Services | violation size is: 1 04:44:32 | INFO | AuditLogAlertsTest | Services | e2e-test-detect-GET-CONFIGMAPS triggered after waiting 0 seconds 04:44:32 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify collection continues when it is disabled and then re-enabled PASSED AuditLogAlertsTest > Verify collection stops when feature is is disabled STANDARD_OUT 04:44:32 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Starting testcase: Verify collection stops when feature is is disabled 04:44:37 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez0203a5ba-3612-4eef-bc35-55d41159ee96: ConfigMap created. 04:44:43 | DEBUG | AuditLogAlertsTest | Kubernetes | e2e-test-rez0203a5ba-3612-4eef-bc35-55d41159ee96: ConfigMap removed. 04:44:43 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:44:46 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:44:49 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:44:52 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:44:55 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:44:58 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:01 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:04 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:07 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:10 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:13 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:16 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:19 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:22 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:25 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:28 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:31 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:34 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:37 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:40 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:43 | DEBUG | AuditLogAlertsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:45:43 | INFO | AuditLogAlertsTest | Services | Failed to trigger e2e-test-detect-GET-CONFIGMAPS after waiting 60 seconds 04:45:43 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testcase AuditLogAlertsTest > Verify collection stops when feature is is disabled PASSED AuditLogAlertsTest STANDARD_OUT 04:45:43 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Ending testsuite 04:45:43 | INFO | AuditLogAlertsTest | AuditLogAlertsTest | Checking if cluster is healthy after test 04:45:43 | DEBUG | AuditLogAlertsTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries AuditScrubbingTest STANDARD_OUT 04:45:43 | INFO | AuditScrubbingTest | AuditScrubbingTest | Starting testsuite 04:45:43 | DEBUG | AuditScrubbingTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries AuditScrubbingTest > Verify that audit log entry (#scenario) for ExchangeToken does not contain sensitive data > Verify that audit log entry (invalid basic auth password) for ExchangeToken does not contain sensitive data STANDARD_OUT 04:45:46 | INFO | AuditScrubbingTest | AuditScrubbingTest | Starting testcase: Verify that audit log entry (invalid basic auth password) for ExchangeToken does not contain sensitive data 04:45:47 | INFO | AuditScrubbingTest | AuditScrubbingTest | Ending testcase AuditScrubbingTest > Verify that audit log entry (#scenario) for ExchangeToken does not contain sensitive data > Verify that audit log entry (invalid basic auth password) for ExchangeToken does not contain sensitive data PASSED AuditScrubbingTest > Verify that audit log entry (#scenario) for ExchangeToken does not contain sensitive data > Verify that audit log entry (valid basic auth credentials) for ExchangeToken does not contain sensitive data STANDARD_OUT 04:45:47 | INFO | AuditScrubbingTest | AuditScrubbingTest | Starting testcase: Verify that audit log entry (valid basic auth credentials) for ExchangeToken does not contain sensitive data 04:45:47 | INFO | AuditScrubbingTest | AuditScrubbingTest | Ending testcase AuditScrubbingTest > Verify that audit log entry (#scenario) for ExchangeToken does not contain sensitive data > Verify that audit log entry (valid basic auth credentials) for ExchangeToken does not contain sensitive data PASSED AuditScrubbingTest STANDARD_OUT 04:45:47 | INFO | AuditScrubbingTest | AuditScrubbingTest | Ending testsuite 04:45:47 | INFO | AuditScrubbingTest | AuditScrubbingTest | Checking if cluster is healthy after test 04:45:47 | DEBUG | AuditScrubbingTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries AuthServiceTest STANDARD_OUT 04:45:47 | INFO | AuthServiceTest | AuthServiceTest | Starting testsuite AuthServiceTest > Verify response for basic auth STANDARD_OUT 04:45:47 | INFO | AuthServiceTest | AuthServiceTest | Starting testcase: Verify response for basic auth 04:45:47 | INFO | AuthServiceTest | AuthServiceTest | Ending testcase AuthServiceTest > Verify response for basic auth PASSED AuthServiceTest > Verify response for auth token STANDARD_OUT 04:45:47 | INFO | AuthServiceTest | AuthServiceTest | Starting testcase: Verify response for auth token 04:45:47 | INFO | AuthServiceTest | AuthServiceTest | Ending testcase AuthServiceTest > Verify response for auth token PASSED AuthServiceTest STANDARD_OUT 04:45:47 | INFO | AuthServiceTest | AuthServiceTest | Ending testsuite 04:45:47 | INFO | AuthServiceTest | AuthServiceTest | Checking if cluster is healthy after test 04:45:47 | DEBUG | AuthServiceTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries AutocompleteTest STANDARD_OUT 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Starting testsuite AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject:system:auth [] system:authenticated STANDARD_OUT 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify Autocomplete: Subject:system:auth [] system:authenticated 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject:system:auth [] system:authenticated PASSED AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject:system:auth [SUBJECTS] system:authenticated STANDARD_OUT 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify Autocomplete: Subject:system:auth [SUBJECTS] system:authenticated 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject:system:auth [SUBJECTS] system:authenticated PASSED AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject Kind:GROUP [] GROUP STANDARD_OUT 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify Autocomplete: Subject Kind:GROUP [] GROUP 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject Kind:GROUP [] GROUP PASSED AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject Kind:group [] GROUP STANDARD_OUT 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify Autocomplete: Subject Kind:group [] GROUP 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject Kind:group [] GROUP PASSED AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject Kind:gr [] GROUP STANDARD_OUT 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify Autocomplete: Subject Kind:gr [] GROUP 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify Autocomplete: #query #category #contains > Verify Autocomplete: Subject Kind:gr [] GROUP PASSED AutocompleteTest > Verify #category search options contains #options > Verify ALERTS search options contains [Deployment, Policy] STANDARD_OUT 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify ALERTS search options contains [Deployment, Policy] 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify ALERTS search options contains [Deployment, Policy] PASSED AutocompleteTest > Verify #category search options contains #options > Verify DEPLOYMENTS search options contains [Deployment, Process Name, Image Tag, Dockerfile Instruction Keyword, CVE, Component] STANDARD_OUT 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify DEPLOYMENTS search options contains [Deployment, Process Name, Image Tag, Dockerfile Instruction Keyword, CVE, Component] 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify DEPLOYMENTS search options contains [Deployment, Process Name, Image Tag, Dockerfile Instruction Keyword, CVE, Component] PASSED AutocompleteTest > Verify #category search options contains #options > Verify IMAGES search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] STANDARD_OUT 04:45:47 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify IMAGES search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify IMAGES search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] PASSED AutocompleteTest > Verify #category search options contains #options > Verify IMAGE_VULNERABILITIES_V2 search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify IMAGE_VULNERABILITIES_V2 search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify IMAGE_VULNERABILITIES_V2 search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] PASSED AutocompleteTest > Verify #category search options contains #options > Verify IMAGE_COMPONENTS_V2 search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify IMAGE_COMPONENTS_V2 search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify IMAGE_COMPONENTS_V2 search options contains [Cluster, Deployment, Image Tag, Dockerfile Instruction Keyword, CVE, Component] PASSED AutocompleteTest > Verify #category search options contains #options > Verify PODS search options contains [Namespace] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify PODS search options contains [Namespace] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify PODS search options contains [Namespace] PASSED AutocompleteTest > Verify #category search options contains #options > Verify POLICIES search options contains [Policy] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify POLICIES search options contains [Policy] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify POLICIES search options contains [Policy] PASSED AutocompleteTest > Verify #category search options contains #options > Verify SECRETS search options contains [Secret] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify SECRETS search options contains [Secret] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify SECRETS search options contains [Secret] PASSED AutocompleteTest > Verify #category search options contains #options > Verify PROCESS_INDICATORS search options contains [Process Name] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify PROCESS_INDICATORS search options contains [Process Name] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify PROCESS_INDICATORS search options contains [Process Name] PASSED AutocompleteTest > Verify #category search options contains #options > Verify CLUSTERS search options contains [Cluster] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify CLUSTERS search options contains [Cluster] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify CLUSTERS search options contains [Cluster] PASSED AutocompleteTest > Verify #category search options contains #options > Verify NAMESPACES search options contains [Cluster, Namespace] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify NAMESPACES search options contains [Cluster, Namespace] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify NAMESPACES search options contains [Cluster, Namespace] PASSED AutocompleteTest > Verify #category search options contains #options > Verify COMPLIANCE search options contains [Cluster, Control, Deployment, Namespace, Node, Standard] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify COMPLIANCE search options contains [Cluster, Control, Deployment, Namespace, Node, Standard] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify COMPLIANCE search options contains [Cluster, Control, Deployment, Namespace, Node, Standard] PASSED AutocompleteTest > Verify #category search options contains #options > Verify NODES search options contains [Cluster, Node] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify NODES search options contains [Cluster, Node] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify NODES search options contains [Cluster, Node] PASSED AutocompleteTest > Verify #category search options contains #options > Verify SERVICE_ACCOUNTS search options contains [Cluster, Service Account] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify SERVICE_ACCOUNTS search options contains [Cluster, Service Account] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify SERVICE_ACCOUNTS search options contains [Cluster, Service Account] PASSED AutocompleteTest > Verify #category search options contains #options > Verify ROLES search options contains [Cluster, Role] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify ROLES search options contains [Cluster, Role] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify ROLES search options contains [Cluster, Role] PASSED AutocompleteTest > Verify #category search options contains #options > Verify ROLEBINDINGS search options contains [Cluster, Role Binding, Subject] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify ROLEBINDINGS search options contains [Cluster, Role Binding, Subject] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify ROLEBINDINGS search options contains [Cluster, Role Binding, Subject] PASSED AutocompleteTest > Verify #category search options contains #options > Verify SUBJECTS search options contains [Subject] STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Starting testcase: Verify SUBJECTS search options contains [Subject] 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testcase AutocompleteTest > Verify #category search options contains #options > Verify SUBJECTS search options contains [Subject] PASSED AutocompleteTest STANDARD_OUT 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Ending testsuite 04:45:48 | INFO | AutocompleteTest | AutocompleteTest | Checking if cluster is healthy after test 04:45:48 | DEBUG | AutocompleteTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries BuiltinPoliciesTest STANDARD_OUT 04:45:48 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testsuite 04:45:48 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: ADD Command used instead of COPY 04:45:48 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Container using read-write root filesystem 04:45:48 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Curl in Image 04:45:48 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Deployments should have at least one ingress Network Policy 04:45:49 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Deployments with externally exposed endpoints 04:45:49 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Docker CIS 4.4: Ensure images are scanned and rebuilt to include security patches 04:45:49 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Docker CIS 5.21: Ensure the default seccomp profile is not disabled 04:45:49 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Drop All Capabilities 04:45:49 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Fixable CVSS >= 6 and Privileged 04:45:49 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Fixable CVSS >= 7 04:45:49 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Images with no scans 04:45:49 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Login Binaries 04:45:49 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Password Binaries 04:45:49 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Process with UID 0 04:45:50 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Rapid Reset: Denial of Service Vulnerability in HTTP/2 Protocol 04:45:50 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Red Hat images must be signed by a Red Hat release key 04:45:50 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Required Annotation: Email 04:45:50 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Required Annotation: Owner/Team 04:45:50 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Required Image Label 04:45:50 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Required Label: Owner/Team 04:45:50 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Secret Mounted as Environment Variable 04:45:50 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: SetUID Processes 04:45:50 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Shadow File Modification 04:45:50 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Shell Management 04:45:51 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Temporarily enabling a disabled policy for testing: Wget in Image 04:45:51 | DEBUG | BuiltinPoliciesTest | Kubernetes | test-password: secret created. 04:45:51 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting trigger-docker-mount without waiting for deployment 04:45:51 | DEBUG | BuiltinPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace trigger-docker-mount 04:45:51 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting trigger-crio-mount without waiting for deployment 04:45:51 | DEBUG | BuiltinPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace trigger-crio-mount 04:45:51 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting trigger-unscanned without waiting for deployment 04:45:51 | DEBUG | BuiltinPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace trigger-unscanned 04:45:51 | DEBUG | BuiltinPoliciesTest | OpenShift | Namespace qa already exists 04:45:51 | DEBUG | BuiltinPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace trigger-most 04:45:51 | DEBUG | BuiltinPoliciesTest | OpenShift | Namespace qa already exists 04:45:51 | DEBUG | BuiltinPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace trigger-alpine 04:45:51 | DEBUG | BuiltinPoliciesTest | Kubernetes | Waiting for trigger-most to start 04:45:51 | DEBUG | BuiltinPoliciesTest | Kubernetes | Status of trigger-most's pods: 04:45:51 | DEBUG | BuiltinPoliciesTest | Kubernetes | - trigger-most-bbc48869c-kx9wl Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:45:51 | DEBUG | BuiltinPoliciesTest | Kubernetes | 0/1 are in the ready state for trigger-most 04:45:54 | DEBUG | BuiltinPoliciesTest | Kubernetes | Waiting for trigger-most to start 04:45:54 | DEBUG | BuiltinPoliciesTest | Kubernetes | Status of trigger-most's pods: 04:45:54 | DEBUG | BuiltinPoliciesTest | Kubernetes | - trigger-most-bbc48869c-kx9wl Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:45:54 | DEBUG | BuiltinPoliciesTest | Kubernetes | 0/1 are in the ready state for trigger-most 04:45:57 | DEBUG | BuiltinPoliciesTest | Kubernetes | Waiting for trigger-most to start 04:45:57 | DEBUG | BuiltinPoliciesTest | Kubernetes | Status of trigger-most's pods: 04:45:57 | DEBUG | BuiltinPoliciesTest | Kubernetes | - trigger-most-bbc48869c-kx9wl Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:45:57 | DEBUG | BuiltinPoliciesTest | Kubernetes | 0/1 are in the ready state for trigger-most 04:46:00 | DEBUG | BuiltinPoliciesTest | Kubernetes | Waiting for trigger-most to start 04:46:00 | DEBUG | BuiltinPoliciesTest | Kubernetes | Status of trigger-most's pods: 04:46:00 | DEBUG | BuiltinPoliciesTest | Kubernetes | - trigger-most-bbc48869c-kx9wl Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:45:57Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:46:00 | DEBUG | BuiltinPoliciesTest | Kubernetes | All 1 replicas found in ready state for trigger-most 04:46:00 | DEBUG | BuiltinPoliciesTest | Kubernetes | Took 9 seconds for k8s deployment trigger-most 04:46:00 | DEBUG | BuiltinPoliciesTest | Kubernetes | Updating deployment trigger-most with 1 pods 04:46:00 | DEBUG | BuiltinPoliciesTest | Kubernetes | Waiting for trigger-alpine to start 04:46:00 | DEBUG | BuiltinPoliciesTest | Kubernetes | Status of trigger-alpine's pods: 04:46:00 | DEBUG | BuiltinPoliciesTest | Kubernetes | - trigger-alpine-59c7b57868-9chkn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:45:53Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:46:00 | DEBUG | BuiltinPoliciesTest | Kubernetes | All 1 replicas found in ready state for trigger-alpine 04:46:00 | DEBUG | BuiltinPoliciesTest | Kubernetes | Took 0 seconds for k8s deployment trigger-alpine 04:46:00 | DEBUG | BuiltinPoliciesTest | Kubernetes | Updating deployment trigger-alpine with 1 pods 04:46:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Waiting for trigger-most 04:46:00 | INFO | BuiltinPoliciesTest | Services | SR found deployment trigger-most within 0s 04:46:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Waiting for trigger-alpine 04:46:00 | INFO | BuiltinPoliciesTest | Services | SR found deployment trigger-alpine within 0s BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Alpine Linux Package Manager Execution' is triggered STANDARD_OUT 04:46:00 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Alpine Linux Package Manager Execution' is triggered 04:46:00 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:01 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:01 | INFO | BuiltinPoliciesTest | Services | Alpine Linux Package Manager Execution triggered after waiting 0 seconds 04:46:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Alpine Linux Package Manager Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'chkconfig Execution' is triggered STANDARD_OUT 04:46:01 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'chkconfig Execution' is triggered 04:46:01 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:04 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:04 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:04 | INFO | BuiltinPoliciesTest | Services | chkconfig Execution triggered after waiting 3 seconds 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'chkconfig Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Container using read-write root filesystem' is triggered STANDARD_OUT 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Container using read-write root filesystem' is triggered 04:46:04 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:04 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:04 | INFO | BuiltinPoliciesTest | Services | Container using read-write root filesystem triggered after waiting 0 seconds 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Container using read-write root filesystem' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Compiler Tool Execution' is triggered STANDARD_OUT 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Compiler Tool Execution' is triggered 04:46:04 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:04 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:04 | INFO | BuiltinPoliciesTest | Services | Compiler Tool Execution triggered after waiting 0 seconds 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Compiler Tool Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'crontab Execution' is triggered STANDARD_OUT 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'crontab Execution' is triggered 04:46:04 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:04 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:04 | INFO | BuiltinPoliciesTest | Services | crontab Execution triggered after waiting 0 seconds 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'crontab Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Cryptocurrency Mining Process Execution' is triggered STANDARD_OUT 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Cryptocurrency Mining Process Execution' is triggered 04:46:04 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:04 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:04 | INFO | BuiltinPoliciesTest | Services | Cryptocurrency Mining Process Execution triggered after waiting 0 seconds 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Cryptocurrency Mining Process Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Emergency Deployment Annotation' is triggered STANDARD_OUT 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Emergency Deployment Annotation' is triggered 04:46:04 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:04 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:04 | INFO | BuiltinPoliciesTest | Services | Emergency Deployment Annotation triggered after waiting 0 seconds 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Emergency Deployment Annotation' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Images with no scans' is triggered STANDARD_OUT 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Images with no scans' is triggered 04:46:04 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:04 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:04 | INFO | BuiltinPoliciesTest | Services | Images with no scans triggered after waiting 0 seconds 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Images with no scans' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'iptables Execution' is triggered STANDARD_OUT 04:46:04 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'iptables Execution' is triggered 04:46:05 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:05 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:05 | INFO | BuiltinPoliciesTest | Services | iptables Execution triggered after waiting 0 seconds 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'iptables Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Iptables or nftables Executed in Privileged Container' is triggered STANDARD_OUT 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Iptables or nftables Executed in Privileged Container' is triggered 04:46:05 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:05 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:05 | INFO | BuiltinPoliciesTest | Services | Iptables or nftables Executed in Privileged Container triggered after waiting 0 seconds 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Iptables or nftables Executed in Privileged Container' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Linux Group Add Execution' is triggered STANDARD_OUT 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Linux Group Add Execution' is triggered 04:46:05 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:05 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:05 | INFO | BuiltinPoliciesTest | Services | Linux Group Add Execution triggered after waiting 0 seconds 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Linux Group Add Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Linux User Add Execution' is triggered STANDARD_OUT 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Linux User Add Execution' is triggered 04:46:05 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:05 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:05 | INFO | BuiltinPoliciesTest | Services | Linux User Add Execution triggered after waiting 0 seconds 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Linux User Add Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Login Binaries' is triggered STANDARD_OUT 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Login Binaries' is triggered 04:46:05 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:05 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:05 | INFO | BuiltinPoliciesTest | Services | Login Binaries triggered after waiting 0 seconds 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Login Binaries' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Mount Container Runtime Socket' is triggered STANDARD_OUT 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Mount Container Runtime Socket' is triggered 04:46:05 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:05 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:05 | INFO | BuiltinPoliciesTest | Services | Mount Container Runtime Socket triggered after waiting 0 seconds 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Mount Container Runtime Socket' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Mount Container Runtime Socket' is triggered STANDARD_OUT 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Mount Container Runtime Socket' is triggered 04:46:05 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:05 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:05 | INFO | BuiltinPoliciesTest | Services | Mount Container Runtime Socket triggered after waiting 0 seconds 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Mount Container Runtime Socket' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Mounting Sensitive Host Directories' is triggered STANDARD_OUT 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Mounting Sensitive Host Directories' is triggered 04:46:05 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:05 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:05 | INFO | BuiltinPoliciesTest | Services | Mounting Sensitive Host Directories triggered after waiting 0 seconds 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Mounting Sensitive Host Directories' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Netcat Execution Detected' is triggered STANDARD_OUT 04:46:05 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Netcat Execution Detected' is triggered 04:46:05 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:06 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:06 | INFO | BuiltinPoliciesTest | Services | Netcat Execution Detected triggered after waiting 0 seconds 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Netcat Execution Detected' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Network Management Execution' is triggered STANDARD_OUT 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Network Management Execution' is triggered 04:46:06 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:06 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:06 | INFO | BuiltinPoliciesTest | Services | Network Management Execution triggered after waiting 0 seconds 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Network Management Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'nmap Execution' is triggered STANDARD_OUT 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'nmap Execution' is triggered 04:46:06 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:06 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:06 | INFO | BuiltinPoliciesTest | Services | nmap Execution triggered after waiting 0 seconds 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'nmap Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'No CPU request or memory limit specified' is triggered STANDARD_OUT 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'No CPU request or memory limit specified' is triggered 04:46:06 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:06 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:06 | INFO | BuiltinPoliciesTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'No CPU request or memory limit specified' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Password Binaries' is triggered STANDARD_OUT 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Password Binaries' is triggered 04:46:06 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:06 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:06 | INFO | BuiltinPoliciesTest | Services | Password Binaries triggered after waiting 0 seconds 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Password Binaries' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process Targeting Cluster Kubelet Endpoint' is triggered STANDARD_OUT 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Process Targeting Cluster Kubelet Endpoint' is triggered 04:46:06 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:06 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:06 | INFO | BuiltinPoliciesTest | Services | Process Targeting Cluster Kubelet Endpoint triggered after waiting 0 seconds 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process Targeting Cluster Kubelet Endpoint' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process Targeting Cluster Kubernetes Docker Stats Endpoint' is triggered STANDARD_OUT 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Process Targeting Cluster Kubernetes Docker Stats Endpoint' is triggered 04:46:06 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:06 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:06 | INFO | BuiltinPoliciesTest | Services | Process Targeting Cluster Kubernetes Docker Stats Endpoint triggered after waiting 0 seconds 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process Targeting Cluster Kubernetes Docker Stats Endpoint' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process Targeting Kubernetes Service Endpoint' is triggered STANDARD_OUT 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Process Targeting Kubernetes Service Endpoint' is triggered 04:46:06 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:06 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:06 | INFO | BuiltinPoliciesTest | Services | Process Targeting Kubernetes Service Endpoint triggered after waiting 0 seconds 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process Targeting Kubernetes Service Endpoint' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process with UID 0' is triggered STANDARD_OUT 04:46:06 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Process with UID 0' is triggered 04:46:06 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:07 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:07 | INFO | BuiltinPoliciesTest | Services | Process with UID 0 triggered after waiting 0 seconds 04:46:07 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Process with UID 0' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Red Hat Package Manager Execution' is triggered STANDARD_OUT 04:46:07 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Red Hat Package Manager Execution' is triggered 04:46:07 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:10 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:10 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:10 | INFO | BuiltinPoliciesTest | Services | Red Hat Package Manager Execution triggered after waiting 3 seconds 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Red Hat Package Manager Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Remote File Copy Binary Execution' is triggered STANDARD_OUT 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Remote File Copy Binary Execution' is triggered 04:46:10 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:10 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:10 | INFO | BuiltinPoliciesTest | Services | Remote File Copy Binary Execution triggered after waiting 0 seconds 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Remote File Copy Binary Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Required Annotation: Email' is triggered STANDARD_OUT 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Required Annotation: Email' is triggered 04:46:10 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:10 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:10 | INFO | BuiltinPoliciesTest | Services | Required Annotation: Email triggered after waiting 0 seconds 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Required Annotation: Email' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Required Annotation: Owner/Team' is triggered STANDARD_OUT 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Required Annotation: Owner/Team' is triggered 04:46:10 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:10 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:10 | INFO | BuiltinPoliciesTest | Services | Required Annotation: Owner/Team triggered after waiting 0 seconds 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Required Annotation: Owner/Team' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Required Label: Owner/Team' is triggered STANDARD_OUT 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Required Label: Owner/Team' is triggered 04:46:10 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:10 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:10 | INFO | BuiltinPoliciesTest | Services | Required Label: Owner/Team triggered after waiting 0 seconds 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Required Label: Owner/Team' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Secret Mounted as Environment Variable' is triggered STANDARD_OUT 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Secret Mounted as Environment Variable' is triggered 04:46:10 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:10 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:10 | INFO | BuiltinPoliciesTest | Services | Secret Mounted as Environment Variable triggered after waiting 0 seconds 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Secret Mounted as Environment Variable' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Secure Shell Server (sshd) Execution' is triggered STANDARD_OUT 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Secure Shell Server (sshd) Execution' is triggered 04:46:10 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:10 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:10 | INFO | BuiltinPoliciesTest | Services | Secure Shell Server (sshd) Execution triggered after waiting 0 seconds 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Secure Shell Server (sshd) Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'SetUID Processes' is triggered STANDARD_OUT 04:46:10 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'SetUID Processes' is triggered 04:46:11 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:11 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:11 | INFO | BuiltinPoliciesTest | Services | SetUID Processes triggered after waiting 0 seconds 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'SetUID Processes' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Shadow File Modification' is triggered STANDARD_OUT 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Shadow File Modification' is triggered 04:46:11 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:11 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:11 | INFO | BuiltinPoliciesTest | Services | Shadow File Modification triggered after waiting 0 seconds 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Shadow File Modification' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Shell Spawned by Java Application' is triggered STANDARD_OUT 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Shell Spawned by Java Application' is triggered 04:46:11 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:11 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:11 | INFO | BuiltinPoliciesTest | Services | Shell Spawned by Java Application triggered after waiting 0 seconds 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Shell Spawned by Java Application' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'systemctl Execution' is triggered STANDARD_OUT 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'systemctl Execution' is triggered 04:46:11 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:11 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:11 | INFO | BuiltinPoliciesTest | Services | systemctl Execution triggered after waiting 0 seconds 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'systemctl Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'systemd Execution' is triggered STANDARD_OUT 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'systemd Execution' is triggered 04:46:11 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:11 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:11 | INFO | BuiltinPoliciesTest | Services | systemd Execution triggered after waiting 0 seconds 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'systemd Execution' is triggered PASSED BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Ubuntu Package Manager Execution' is triggered STANDARD_OUT 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Starting testcase: Verify policy 'Ubuntu Package Manager Execution' is triggered 04:46:11 | DEBUG | BuiltinPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:46:11 | INFO | BuiltinPoliciesTest | Services | violation size is: 1 04:46:11 | INFO | BuiltinPoliciesTest | Services | Ubuntu Package Manager Execution triggered after waiting 0 seconds 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testcase BuiltinPoliciesTest > Verify policy '#policyName' is triggered > Verify policy 'Ubuntu Package Manager Execution' is triggered PASSED BuiltinPoliciesTest STANDARD_OUT 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:11 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:12 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:12 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:12 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:12 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:12 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:12 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:12 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:12 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:12 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:12 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:13 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:13 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:13 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:13 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:13 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:13 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:13 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:13 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:13 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:13 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:13 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Re-disabling a policy after test 04:46:14 | DEBUG | BuiltinPoliciesTest | Kubernetes | Removed the deployment: trigger-most 04:46:14 | DEBUG | BuiltinPoliciesTest | Kubernetes | Removed the deployment: trigger-alpine 04:46:14 | DEBUG | BuiltinPoliciesTest | Kubernetes | Removed the deployment: trigger-docker-mount 04:46:14 | DEBUG | BuiltinPoliciesTest | Kubernetes | Removed the deployment: trigger-crio-mount 04:46:14 | DEBUG | BuiltinPoliciesTest | Kubernetes | Removed the deployment: trigger-unscanned 04:46:19 | DEBUG | BuiltinPoliciesTest | Kubernetes | test-password: Secret removed. 04:46:19 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Ending testsuite 04:46:19 | INFO | BuiltinPoliciesTest | BuiltinPoliciesTest | Checking if cluster is healthy after test 04:46:19 | DEBUG | BuiltinPoliciesTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries CSVTest STANDARD_OUT 04:46:19 | INFO | CSVTest | CSVTest | Starting testsuite 04:46:25 | DEBUG | CSVTest | OpenShift | Namespace qa already exists 04:46:25 | DEBUG | CSVTest | Kubernetes | Told the orchestrator to createOrReplace nginx-deployment 04:46:25 | DEBUG | CSVTest | Kubernetes | Waiting for nginx-deployment to start 04:46:25 | DEBUG | CSVTest | Kubernetes | Status of nginx-deployment's pods: 04:46:25 | DEBUG | CSVTest | Kubernetes | - nginx-deployment-7f7dfc5fcd-qgwsw Container status: [] 04:46:25 | DEBUG | CSVTest | Kubernetes | 0/1 are in the ready state for nginx-deployment 04:46:28 | DEBUG | CSVTest | Kubernetes | Waiting for nginx-deployment to start 04:46:28 | DEBUG | CSVTest | Kubernetes | Status of nginx-deployment's pods: 04:46:28 | DEBUG | CSVTest | Kubernetes | - nginx-deployment-7f7dfc5fcd-qgwsw Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:46:26Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:46:28 | DEBUG | CSVTest | Kubernetes | All 1 replicas found in ready state for nginx-deployment 04:46:28 | DEBUG | CSVTest | Kubernetes | Took 3 seconds for k8s deployment nginx-deployment 04:46:28 | DEBUG | CSVTest | Kubernetes | Updating deployment nginx-deployment with 1 pods 04:46:28 | INFO | CSVTest | Services | SR found deployment nginx-deployment within 0s 04:46:41 | INFO | CSVTest | Services | SR found vulnerabilities for the image quay.io/rhacs-eng/qa-multi-arch:nginx-1.12@sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728 within 12s CSVTest > Verify CVE CSV data scoped by entity is correct #description > Verify CVE CSV data scoped by entity is correct FIXABLE_CVES_IN_IMAGE_QUERY STANDARD_OUT 04:46:41 | INFO | CSVTest | CSVTest | Starting testcase: Verify CVE CSV data scoped by entity is correct FIXABLE_CVES_IN_IMAGE_QUERY 04:46:41 | DEBUG | CSVTest | GraphQLService | GraphQL query: {"query":"\n query getFixableCvesInImage($id: ID!, $query: String, $scopeQuery: String, $vulnQuery: String,\n $vulnPagination: Pagination) {\n result: image(id: $id) {\n id\n vulnerabilities: imageVulnerabilities(query: $vulnQuery, pagination: $vulnPagination) {\n ...cveFields\n __typename\n }\n __typename\n }\n }\n \n fragment cveFields on ImageVulnerability {\n id: cve\n cvss\n isFixable(query: $scopeQuery)\n deploymentCount(query: $query)\n imageCount(query: $query)\n componentCount: imageComponentCount(query: $query)\n __typename\n }\n \n ","variables":{"id":"sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728","query":"","scopeQuery":"","vulnQuery":"Fixable:true","vulnPagination":{"limit":0,"offset":0,"sortOption":{"field":"cvss","reversed":true}}}} 04:46:41 | DEBUG | CSVTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":{"id":"sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728","vulnerabilities":[{"id":"CVE-2018-14599","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2018-25014","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2019-6978","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2022-25315","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2022-25236","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2019-11068","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"Image... 04:46:42 | INFO | CSVTest | CSVTest | Number of CVEs received from CSV endpoint: 152 04:46:42 | INFO | CSVTest | CSVTest | Ending testcase CSVTest > Verify CVE CSV data scoped by entity is correct #description > Verify CVE CSV data scoped by entity is correct FIXABLE_CVES_IN_IMAGE_QUERY PASSED CSVTest > Verify CVE CSV data scoped by entity is correct #description > Verify CVE CSV data scoped by entity is correct FIXABLE_CVES_IN_DEPLOYMENT_QUERY STANDARD_OUT 04:46:42 | INFO | CSVTest | CSVTest | Starting testcase: Verify CVE CSV data scoped by entity is correct FIXABLE_CVES_IN_DEPLOYMENT_QUERY 04:46:42 | DEBUG | CSVTest | GraphQLService | GraphQL query: {"query":"\n query getFixableCvesInDeployment($id: ID!, $query: String, $scopeQuery: String, $vulnQuery: String,\n $vulnPagination: Pagination) {\n result: deployment(id: $id) {\n id\n vulnerabilities: imageVulnerabilities(query: $vulnQuery, pagination: $vulnPagination) {\n ...cveFields\n __typename\n }\n __typename\n }\n }\n \n fragment cveFields on ImageVulnerability {\n id: cve\n cvss\n isFixable(query: $scopeQuery)\n deploymentCount(query: $query)\n imageCount(query: $query)\n componentCount: imageComponentCount(query: $query)\n __typename\n }\n \n ","variables":{"id":"1b73ca65-6f3f-43ca-b190-342cac6824c4","query":"","scopeQuery":"","vulnQuery":"Fixable:true","vulnPagination":{"limit":0,"offset":0,"sortOption":{"field":"cvss","reversed":true}}}} 04:46:42 | DEBUG | CSVTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":{"id":"1b73ca65-6f3f-43ca-b190-342cac6824c4","vulnerabilities":[{"id":"CVE-2018-14599","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2018-25014","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2019-6978","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2022-25315","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2022-25236","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2019-11068","cvss":9.800000190734863,"isFixable":true,"deploymentCount":1,"imageCount":1,"componentCount":1,"__typename":"ImageVulnerability"},{"id":"CVE-2017-124... 04:46:43 | INFO | CSVTest | CSVTest | Number of CVEs received from CSV endpoint: 152 04:46:43 | INFO | CSVTest | CSVTest | Ending testcase CSVTest > Verify CVE CSV data scoped by entity is correct #description > Verify CVE CSV data scoped by entity is correct FIXABLE_CVES_IN_DEPLOYMENT_QUERY PASSED CSVTest STANDARD_OUT 04:46:43 | DEBUG | CSVTest | Kubernetes | Removed the deployment: nginx-deployment 04:46:43 | INFO | CSVTest | CSVTest | Ending testsuite 04:46:43 | INFO | CSVTest | CSVTest | Checking if cluster is healthy after test 04:46:43 | DEBUG | CSVTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries CertExpiryTest STANDARD_OUT 04:46:43 | INFO | CertExpiryTest | CertExpiryTest | Starting testsuite CertExpiryTest > Test Central cert expiry STANDARD_OUT 04:46:43 | INFO | CertExpiryTest | CertExpiryTest | Starting testcase: Test Central cert expiry 04:46:43 | INFO | CertExpiryTest | CertExpiryTest | Ending testcase CertExpiryTest > Test Central cert expiry PASSED CertExpiryTest > Test Scanner cert expiry STANDARD_OUT 04:46:43 | INFO | CertExpiryTest | CertExpiryTest | Starting testcase: Test Scanner cert expiry 04:46:44 | DEBUG | CertExpiryTest | Helpers | Ran: ./scripts/ci/is-scanner-v2-available.sh stackrox Exit: 0 Stdout: INFO: Thu Nov 27 04:46:43 UTC 2025: Waiting for Scanner V2 deployment to appear in namespace stackrox... INFO: Thu Nov 27 04:46:44 UTC 2025: ** Scanner V2 is deployed in namespace stackrox pod/scanner-c854f7f8c-jdw9n condition met Stderr: 04:46:44 | INFO | CertExpiryTest | CertExpiryTest | Ending testcase CertExpiryTest > Test Scanner cert expiry PASSED CertExpiryTest STANDARD_OUT 04:46:44 | INFO | CertExpiryTest | CertExpiryTest | Ending testsuite 04:46:44 | INFO | CertExpiryTest | CertExpiryTest | Checking if cluster is healthy after test 04:46:44 | DEBUG | CertExpiryTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries CertRotationTest STANDARD_OUT 04:46:44 | INFO | CertRotationTest | CertRotationTest | Starting testsuite CertRotationTest > Test Central cert rotation STANDARD_OUT 04:46:44 | INFO | CertRotationTest | CertRotationTest | Starting testcase: Test Central cert rotation 04:46:44 | INFO | CertRotationTest | CertRotationTest | Ending testcase CertRotationTest > Test Central cert rotation PASSED CertRotationTest > Test Scanner cert rotation STANDARD_OUT 04:46:44 | INFO | CertRotationTest | CertRotationTest | Starting testcase: Test Scanner cert rotation 04:46:44 | INFO | CertRotationTest | CertRotationTest | Ending testcase CertRotationTest > Test Scanner cert rotation PASSED CertRotationTest > Test sensor cert rotation STANDARD_OUT 04:46:44 | INFO | CertRotationTest | CertRotationTest | Starting testcase: Test sensor cert rotation 04:46:44 | INFO | CertRotationTest | CertRotationTest | Admission control secret present: true 04:46:44 | INFO | CertRotationTest | CertRotationTest | Ending testcase CertRotationTest > Test sensor cert rotation PASSED CertRotationTest > Test sensor cert rotation with upgrader succeeds for manifest based installed clusters STANDARD_OUT 04:46:44 | INFO | CertRotationTest | CertRotationTest | Starting testcase: Test sensor cert rotation with upgrader succeeds for manifest based installed clusters 04:46:45 | DEBUG | CertRotationTest | Helpers | Caught exception. Retrying in 3s (attempt 0 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.Secret.getMetadata()" because " 04:46:48 | DEBUG | CertRotationTest | Helpers | Caught exception. Retrying in 3s (attempt 1 of 2): java.lang.NullPointerException: Cannot invoke "io.fabric8.kubernetes.api.model.Secret.getMetadata()" because " 04:46:51 | INFO | CertRotationTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:46:51 | INFO | CertRotationTest | CertRotationTest | Ending testcase CertRotationTest > Test sensor cert rotation with upgrader succeeds for manifest based installed clusters SKIPPED CertRotationTest > Test sensor cert rotation with upgrader fails for Helm clusters STANDARD_OUT 04:46:51 | INFO | CertRotationTest | CertRotationTest | Starting testcase: Test sensor cert rotation with upgrader fails for Helm clusters 04:46:51 | INFO | CertRotationTest | CertRotationTest | Ending testcase CertRotationTest > Test sensor cert rotation with upgrader fails for Helm clusters PASSED CertRotationTest STANDARD_OUT 04:46:51 | INFO | CertRotationTest | CertRotationTest | Ending testsuite 04:46:51 | INFO | CertRotationTest | CertRotationTest | Checking if cluster is healthy after test 04:46:51 | DEBUG | CertRotationTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ClientCertAuthTest STANDARD_OUT 04:46:51 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testsuite 04:46:51 | INFO | ClientCertAuthTest | ClientCertAuthTest | Client cert auth provider ID is 0d9c6d05-c4f1-493b-9fb1-023ef624fea3 04:46:51 | DEBUG | ClientCertAuthTest | Helpers | Calling services.GroupService.createGroup with 3 retries 04:46:51 | INFO | ClientCertAuthTest | ClientCertAuthTest | Certificate token is eyJhbGciOiJSUzI1NiIsImtpZCI6Imp3dGswIiwidHlwIjoiSldUIn0.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.i4R1XKAZ_L7uys8uUvAFKleemfX9NlJr90UW_VTCVKGqK0_u_qxLNmbSMo9kNbdnMd1HVzo8-EDI0Km36lgYDFxzgW8g1P1vXxXRX4lBdTArgRm7NY52lQGqLc5IthuXLXMghtcma1TBkke28GHsJ4_hgdoDOM6edLZMuycWh3L2G7iLw-0F6iHKIbavFrJjWEGW7JnLBv0GzhC5ZXZfr37vcjK3kV-6fVPb39ZADHVW_KAI0fLc8PqaX2GtsawH3JMaIWBJGLTBWnnJH2HKz7wQW8wmZG4rEll4UPO1te4vUPWkmFAtZQ6RfqjxWk854su7-2wP-p6Qpa951LOgsFlUd_vE0HIDeO4Fju221nb8fk5WMt5ljwRJDlP99BMzqIASX_mow7ZWiIdh_atcnVV42mWh9EC0A9kGn58K1wl4P8XXPQ5-neSE2RWMgFRXAQGRAWfAFfl0dx63UPVSsj2DdpB0A1vN-cvRKnyrCA32ONZ6q0bx_QyG3w7v_aelNVe7_ph-69PfxGoA3oHAyEtpA4n1ZUshfhx1-KJmjVVxKuVHjSiBgwuYGU0aiufUAxIVtxiy2VY7ukjW014JIABv5YmM_YXhefL829otj1wlGo6DbtSUt1DS7VSalqqeldsKLCWPdFJWzQpBtEwW1XjiNfHStPwwUmz9DxORWk4 #notsecret 04:46:51 | INFO | ClientCertAuthTest | ClientCertAuthTest | Client cert auth provider ID is e8dd89af-575b-4545-b424-6030a0ca7fd0 04:46:51 | DEBUG | ClientCertAuthTest | Helpers | Calling services.GroupService.createGroup with 3 retries 04:46:51 | INFO | ClientCertAuthTest | ClientCertAuthTest | Certificate token is eyJhbGciOiJSUzI1NiIsImtpZCI6Imp3dGswIiwidHlwIjoiSldUIn0.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.oI0M-9K3Q26kf1zvuRpisrNOMNWVdWNQ_xSlpp8B7BB-moYe29MEROZHKQuWCfhV_HHwJnb_RkeSHDQ8purGy11mh3Lf0YXluysoS5Fbd9yC1-_t-QtrFCs5zpcQvDv4mcpd8ZSHWPSJ_ogAvQzOycVuUOGLQDJPmhTfg2hsAkVgRCvQZXlN9RHDVwm9tc_vqhLVkFNjeLD3j8D6s42jHS1d2b69UGRvSQksU7U45jIvZZ7avw8h7RZc3vL8-xcWAVHNLaUcCZB6D5QUMiWueONx_m7uKzX9KGp7u32OsgmaW_IGzUF8VSF1XmsXGI86uz39FtvzhHzvvMMFPaR-kK5KosYPF2h5oPEpFVgA8u7bXaw1Cj8fOdI6arLH7Qrm_CPModXZlUeKmPdV58BMKijNWIa3vmDcemfNWqEjRRocTnVVgn4ZTAUllFMe7-YAj073ycFMVuWaQFJh5aBLeQA3TZKYL_aF7ioRohmQk6lJscyrDyJ4IqH3uPUnFSnrrdJIM7WvE4wUzqt511MmS7H-OEz4Ia61EemPni4ZCncq9S8a3GwWUySxPqhcCDPgEeJmUOFTEv3KwrFXan29bTbml3YhNMiS-miGVHKzNxEUg81gq3HDBjA9dKCPSIJ__aIVMNIiknxAiqYbvmrhnXa9x5bRDPaEjoUrjfLflZY #notsecret ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header none STANDARD_OUT 04:46:51 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: false and auth header none 04:46:51 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_0(ClientCertAuthTest.groovy:105) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:46:51 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderID(ClientCertAuthTest.groovy:69) [1 skipped] at ClientCertAuthTest.$spock_feature_1_0(ClientCertAuthTest.groovy:109) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:46:51 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header none PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header basic STANDARD_OUT 04:46:51 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: false and auth header basic 04:46:51 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header basic PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header basic STANDARD_OUT 04:46:51 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: true and auth header basic 04:46:51 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:51 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:46:51 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header basic PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header none STANDARD_OUT 04:46:51 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: true and auth header none 04:46:51 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:51 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header none PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header certtoken0 STANDARD_OUT 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: true and auth header certtoken0 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header certtoken0 PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header certtoken1 STANDARD_OUT 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: true and auth header certtoken1 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: true and auth header certtoken1 PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header certtoken0 STANDARD_OUT 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: false and auth header certtoken0 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:46:52 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_0(ClientCertAuthTest.groovy:105) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:46:52 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderID(ClientCertAuthTest.groovy:69) [1 skipped] at ClientCertAuthTest.$spock_feature_1_0(ClientCertAuthTest.groovy:109) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header certtoken0 PASSED ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header certtoken1 STANDARD_OUT 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication result with client cert: false and auth header certtoken1 04:46:52 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_0(ClientCertAuthTest.groovy:105) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:46:52 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderID(ClientCertAuthTest.groovy:69) [1 skipped] at ClientCertAuthTest.$spock_feature_1_0(ClientCertAuthTest.groovy:109) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication result with client cert: #useClientCert and auth header #authHeader > Test authentication result with client cert: false and auth header certtoken1 PASSED ClientCertAuthTest > Delete Auth provider STANDARD_OUT 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Delete Auth provider 04:46:52 | DEBUG | ClientCertAuthTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:46:52 | DEBUG | ClientCertAuthTest | Helpers | Calling services.GroupService.getGroups with 3 retries 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Delete Auth provider PASSED ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: true and auth header none after deletion STANDARD_OUT 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication fails with client cert: true and auth header none after deletion 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:46:52 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_2(ClientCertAuthTest.groovy:169) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: true and auth header none after deletion PASSED ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: true and auth header certtoken0 after deletion STANDARD_OUT 04:46:52 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication fails with client cert: true and auth header certtoken0 after deletion 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:52 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:46:53 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_2(ClientCertAuthTest.groovy:169) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:46:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: true and auth header certtoken0 after deletion PASSED ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: true and auth header certtoken1 after deletion STANDARD_OUT 04:46:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication fails with client cert: true and auth header certtoken1 after deletion 04:46:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:46:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: true) 04:46:53 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_2(ClientCertAuthTest.groovy:169) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:46:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: true and auth header certtoken1 after deletion PASSED ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: false and auth header certtoken0 after deletion STANDARD_OUT 04:46:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication fails with client cert: false and auth header certtoken0 after deletion 04:46:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was closed 04:46:53 | DEBUG | ClientCertAuthTest | BaseService | The gRPC channel to central was opened (useClientCert: false) 04:46:53 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_2(ClientCertAuthTest.groovy:169) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:46:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: false and auth header certtoken0 after deletion PASSED ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: false and auth header certtoken1 after deletion STANDARD_OUT 04:46:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Starting testcase: Test authentication fails with client cert: false and auth header certtoken1 after deletion 04:46:53 | ERROR | ClientCertAuthTest | ClientCertAuthTest | Error getting auth status io.grpc.StatusRuntimeException: UNAUTHENTICATED: credentials not found: token-based: cannot extract identity: token validation failed at io.stackrox.proto.api.v1.AuthServiceGrpc$AuthServiceBlockingStub.getAuthStatus(AuthServiceGrpc.java:487) [3 skipped] at services.AuthService.getAuthStatus(AuthService.groovy:14) at ClientCertAuthTest.getAuthProviderType(ClientCertAuthTest.groovy:60) [1 skipped] at ClientCertAuthTest.$spock_feature_1_2(ClientCertAuthTest.groovy:169) [10 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:46:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testcase ClientCertAuthTest > Test authentication fails with client cert: #useClientCert and auth header #authHeader after deletion > Test authentication fails with client cert: false and auth header certtoken1 after deletion PASSED ClientCertAuthTest STANDARD_OUT 04:46:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Ending testsuite 04:46:53 | INFO | ClientCertAuthTest | ClientCertAuthTest | Checking if cluster is healthy after test 04:46:53 | DEBUG | ClientCertAuthTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries CloudSourcesTest STANDARD_OUT 04:46:53 | INFO | CloudSourcesTest | CloudSourcesTest | Starting testsuite CloudSourcesTest > Create OCM cloud source and verify discovered clusters exist: #authMethod > Create OCM cloud source and verify discovered clusters exist: OCM offline token STANDARD_OUT 04:46:53 | INFO | CloudSourcesTest | CloudSourcesTest | Starting testcase: Create OCM cloud source and verify discovered clusters exist: OCM offline token 04:46:53 | DEBUG | CloudSourcesTest | Helpers | Caught exception. Retrying in 30s (attempt 0 of 10): Condition not satisfied: count > 0 | | 0 false 04:47:23 | INFO | CloudSourcesTest | CloudSourcesService | Cloud source deleted: d17b68f0-42ad-4527-b88a-1222d7c9c610 04:47:23 | INFO | CloudSourcesTest | CloudSourcesTest | Ending testcase CloudSourcesTest > Create OCM cloud source and verify discovered clusters exist: #authMethod > Create OCM cloud source and verify discovered clusters exist: OCM offline token PASSED CloudSourcesTest > Create OCM cloud source and verify discovered clusters exist: #authMethod > Create OCM cloud source and verify discovered clusters exist: OCM service account STANDARD_OUT 04:47:23 | INFO | CloudSourcesTest | CloudSourcesTest | Starting testcase: Create OCM cloud source and verify discovered clusters exist: OCM service account 04:47:24 | DEBUG | CloudSourcesTest | Helpers | Caught exception. Retrying in 30s (attempt 0 of 10): Condition not satisfied: count > 0 | | 0 false 04:47:54 | INFO | CloudSourcesTest | CloudSourcesService | Cloud source deleted: f953bd86-a643-4a42-96d6-623935a6880a 04:47:54 | INFO | CloudSourcesTest | CloudSourcesTest | Ending testcase CloudSourcesTest > Create OCM cloud source and verify discovered clusters exist: #authMethod > Create OCM cloud source and verify discovered clusters exist: OCM service account PASSED CloudSourcesTest STANDARD_OUT 04:47:54 | INFO | CloudSourcesTest | CloudSourcesTest | Ending testsuite 04:47:54 | INFO | CloudSourcesTest | CloudSourcesTest | Checking if cluster is healthy after test 04:47:54 | DEBUG | CloudSourcesTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ClusterInitBundleTest STANDARD_OUT 04:47:54 | INFO | ClusterInitBundleTest | ClusterInitBundleTest | Starting testsuite ClusterInitBundleTest > Test that cluster init bundle can be revoked when it has no impacted clusters STANDARD_OUT 04:47:54 | INFO | ClusterInitBundleTest | ClusterInitBundleTest | Starting testcase: Test that cluster init bundle can be revoked when it has no impacted clusters 04:47:54 | INFO | ClusterInitBundleTest | ClusterInitBundleTest | Ending testcase ClusterInitBundleTest > Test that cluster init bundle can be revoked when it has no impacted clusters PASSED ClusterInitBundleTest STANDARD_OUT 04:47:54 | INFO | ClusterInitBundleTest | ClusterInitBundleTest | Ending testsuite 04:47:54 | INFO | ClusterInitBundleTest | ClusterInitBundleTest | Checking if cluster is healthy after test 04:47:54 | DEBUG | ClusterInitBundleTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ClustersTest STANDARD_OUT 04:47:54 | INFO | ClustersTest | ClustersTest | Starting testsuite ClustersTest > Test cluster status has cert expiry STANDARD_OUT 04:47:54 | INFO | ClustersTest | ClustersTest | Starting testcase: Test cluster status has cert expiry 04:47:54 | INFO | ClustersTest | ClustersTest | Ending testcase ClustersTest > Test cluster status has cert expiry PASSED ClustersTest > Test cluster health status is healthy STANDARD_OUT 04:47:54 | INFO | ClustersTest | ClustersTest | Starting testcase: Test cluster health status is healthy 04:47:54 | INFO | ClustersTest | ClustersTest | Ending testcase ClustersTest > Test cluster health status is healthy PASSED ClustersTest STANDARD_OUT 04:47:54 | INFO | ClustersTest | ClustersTest | Ending testsuite 04:47:54 | INFO | ClustersTest | ClustersTest | Checking if cluster is healthy after test 04:47:54 | DEBUG | ClustersTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ComplianceTest STANDARD_OUT 04:47:54 | INFO | ComplianceTest | ComplianceTest | Starting testsuite 04:47:55 | DEBUG | ComplianceTest | ImageIntegrationService | Integration tested: gcr 04:47:55 | DEBUG | ComplianceTest | ImageIntegrationService | Integration created: gcr: a563c782-22b1-4448-8e38-06b3e1cbb720 04:47:55 | DEBUG | ComplianceTest | ImageIntegrationService | Integration found after creation: gcr: a563c782-22b1-4448-8e38-06b3e1cbb720 04:48:25 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:48:25 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered all compliance runs 04:48:25 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the runs to finish... 04:48:38 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance runs took 13.21s ComplianceTest > Verify static compliance checks STANDARD_OUT 04:48:38 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify static compliance checks 04:48:38 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify static compliance checks PASSED ComplianceTest > Verify compliance aggregation results STANDARD_OUT 04:48:38 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify compliance aggregation results 04:48:39 | INFO | ComplianceTest | ComplianceTest | Verifying aggregate counts for CIS_Kubernetes_v1_5 04:48:39 | INFO | ComplianceTest | ComplianceTest | Verifying aggregate counts for HIPAA_164 04:48:39 | INFO | ComplianceTest | ComplianceTest | Verifying aggregate counts for NIST_800_190 04:48:39 | INFO | ComplianceTest | ComplianceTest | Verifying aggregate counts for NIST_SP_800_53_Rev_4 04:48:39 | INFO | ComplianceTest | ComplianceTest | Verifying aggregate counts for PCI_DSS_3_2 04:48:39 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify compliance aggregation results PASSED ComplianceTest > Verify compliance checks contain no ERROR states STANDARD_OUT 04:48:39 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify compliance checks contain no ERROR states 04:48:39 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify compliance checks contain no ERROR states PASSED ComplianceTest > Verify all compliance checks contain evidence STANDARD_OUT 04:48:39 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify all compliance checks contain evidence 04:48:39 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify all compliance checks contain evidence PASSED ComplianceTest > Verify overall state of each check is correct based on each piece of evidence STANDARD_OUT 04:48:39 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify overall state of each check is correct based on each piece of evidence 04:48:39 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify overall state of each check is correct based on each piece of evidence PASSED ComplianceTest > Verify all kube-system namespace checks are SKIPPED STANDARD_OUT 04:48:39 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify all kube-system namespace checks are SKIPPED 04:48:39 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify all kube-system namespace checks are SKIPPED PASSED ComplianceTest > Verify compliance csv export STANDARD_OUT 04:48:39 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify compliance csv export 04:48:40 | INFO | ComplianceTest | ComplianceTest | Verified 4747 out of 4747 total rows 04:48:40 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify compliance csv export PASSED ComplianceTest > Verify a subset of the checks in nodes were run in each node STANDARD_OUT 04:48:40 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify a subset of the checks in nodes were run in each node 04:48:40 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify a subset of the checks in nodes were run in each node PASSED ComplianceTest > Verify per-node cluster checks generate correct results when there is a master node STANDARD_OUT 04:48:40 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify per-node cluster checks generate correct results when there is a master node 04:48:41 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify per-node cluster checks generate correct results when there is a master node PASSED ComplianceTest > Verify Compliance aggregations with caching STANDARD_OUT 04:48:41 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify Compliance aggregations with caching 04:48:41 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify Compliance aggregations with caching PASSED ComplianceTest > Verify checks based on Integrations STANDARD_OUT 04:48:41 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify checks based on Integrations 04:48:41 | DEBUG | ComplianceTest | ImageIntegrationService | Image integration deleted: a563c782-22b1-4448-8e38-06b3e1cbb720 04:48:41 | DEBUG | ComplianceTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 04:48:41 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:48:41 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered PCI_DSS_3_2 compliance run 04:48:41 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:48:54 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 13.218s 04:48:54 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:48:54 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered NIST_800_190 compliance run 04:48:54 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:49:07 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 13.213s 04:49:07 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:49:08 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered HIPAA_164 compliance run 04:49:08 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:49:21 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 13.212s 04:49:21 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:49:21 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered NIST_SP_800_53_Rev_4 compliance run 04:49:21 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:49:34 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 13.212s 04:49:34 | INFO | ComplianceTest | ComplianceTest | Validating PCI_DSS_3_2:6_1 04:49:34 | INFO | ComplianceTest | ComplianceTest | Validating PCI_DSS_3_2:6_5_6 04:49:34 | INFO | ComplianceTest | ComplianceTest | Validating PCI_DSS_3_2:11_2_1 04:49:34 | INFO | ComplianceTest | ComplianceTest | Validating NIST_800_190:4_1_1 04:49:34 | INFO | ComplianceTest | ComplianceTest | Validating NIST_800_190:4_1_2 04:49:34 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:306_e 04:49:34 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:308_a_1_ii_b 04:49:34 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:308_a_7_ii_e 04:49:34 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:310_a_1 04:49:34 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:314_a_2_i_c 04:49:34 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:314_a_2_i_c 04:49:34 | INFO | ComplianceTest | ComplianceTest | Validating NIST_SP_800_53_Rev_4:IR_6_(1) 04:49:34 | DEBUG | ComplianceTest | ImageIntegrationService | Integration tested: gcr 04:49:35 | DEBUG | ComplianceTest | ImageIntegrationService | Integration created: gcr: 576471f2-101f-496d-b316-1ed2aff46011 04:49:35 | DEBUG | ComplianceTest | ImageIntegrationService | Integration found after creation: gcr: 576471f2-101f-496d-b316-1ed2aff46011 04:49:35 | DEBUG | ComplianceTest | ImageIntegrationService | Integration tested: Stackrox Scanner 04:49:35 | DEBUG | ComplianceTest | ImageIntegrationService | Integration created: Stackrox Scanner: 6662fdfc-53de-48c6-ae4d-5e63284c1118 04:49:35 | DEBUG | ComplianceTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 6662fdfc-53de-48c6-ae4d-5e63284c1118 04:49:35 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify checks based on Integrations PASSED ComplianceTest > Verify checks based on Deployments STANDARD_OUT 04:49:35 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify checks based on Deployments 04:49:35 | INFO | ComplianceTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:49:35 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify checks based on Deployments SKIPPED ComplianceTest > Verify checks based on Policies STANDARD_OUT 04:49:35 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify checks based on Policies 04:49:35 | INFO | ComplianceTest | Services | Updated lifecycleStage of 'Fixable Severity at least Important' to [BUILD, DEPLOY] 04:49:45 | INFO | ComplianceTest | Services | Updated enforcement of 'Fixable Severity at least Important' to [FAIL_BUILD_ENFORCEMENT, SCALE_TO_ZERO_ENFORCEMENT] 04:49:56 | INFO | ComplianceTest | Services | Updated enforcement of 'Privileged Container' to [SCALE_TO_ZERO_ENFORCEMENT] 04:50:06 | INFO | ComplianceTest | Services | Updated enforcement of '90-Day Image Age' to [FAIL_BUILD_ENFORCEMENT, SCALE_TO_ZERO_ENFORCEMENT] 04:50:16 | INFO | ComplianceTest | Services | Updated enforcement of 'Latest tag' to [FAIL_BUILD_ENFORCEMENT, SCALE_TO_ZERO_ENFORCEMENT] 04:50:27 | INFO | ComplianceTest | Services | Updated enforcement of 'Ubuntu Package Manager Execution' to [KILL_POD_ENFORCEMENT] 04:50:37 | INFO | ComplianceTest | Services | Updated enforcement of 'Environment Variable Contains Secret' to [SCALE_TO_ZERO_ENFORCEMENT] 04:50:37 | ERROR | ComplianceTest | PolicyService | error creating new policy io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid error: error validating lifecycle stage error: policy configuration is invalid for deploy time: policy validation error: validation of section "" error: policy criteria "Environment Variable" has invalid value[0]=".*SECRET.*=.*" must match regex "((?m)^(?i:(UNSET|RAW|UNKNOWN|^)=([^=]*)=.*)|((SECRET_KEY|CONFIG_MAP_KEY|FIELD|RESOURCE_FIELD)=([^=]*)=$)$)": invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.postPolicy(PolicyServiceGrpc.java:1022) [3 skipped] at services.PolicyService.createNewPolicy(PolicyService.groovy:31) [1 skipped] at ComplianceTest.$spock_feature_1_12(ComplianceTest.groovy:881) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:50:37 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:50:37 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered NIST_800_190 compliance run 04:50:37 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:50:50 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 13.208s 04:50:50 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:50:50 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered NIST_SP_800_53_Rev_4 compliance run 04:50:50 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:51:03 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 13.21s 04:51:03 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_800_190:4_1_1 04:51:03 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_800_190:4_1_2 04:51:03 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_800_190:4_1_4 04:51:03 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_800_190:4_2_2 04:51:03 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_SP_800_53_Rev_4:CM_2 04:51:03 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_SP_800_53_Rev_4:CM_3 04:51:03 | INFO | ComplianceTest | ComplianceTest | Validating deployment control NIST_SP_800_53_Rev_4:IR_4_(5) 04:51:14 | INFO | ComplianceTest | Services | Updated enforcement of 'Fixable Severity at least Important' to [FAIL_BUILD_ENFORCEMENT] 04:51:24 | INFO | ComplianceTest | Services | Updated enforcement of 'Privileged Container' to have no enforcement actions 04:51:34 | INFO | ComplianceTest | Services | Updated enforcement of '90-Day Image Age' to have no enforcement actions 04:51:44 | INFO | ComplianceTest | Services | Updated enforcement of 'Latest tag' to have no enforcement actions 04:51:54 | INFO | ComplianceTest | Services | Updated enforcement of 'Ubuntu Package Manager Execution' to have no enforcement actions 04:52:05 | INFO | ComplianceTest | Services | Updated enforcement of 'Environment Variable Contains Secret' to have no enforcement actions 04:52:05 | INFO | ComplianceTest | Services | Updated lifecycleStage of 'Fixable CVSS >= 7' to [DEPLOY] 04:52:05 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify checks based on Policies PASSED ComplianceTest > Verify controls that rely on CIS Benchmarks STANDARD_OUT 04:52:05 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify controls that rely on CIS Benchmarks 04:52:05 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:52:05 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered PCI_DSS_3_2 compliance run 04:52:05 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:52:18 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 13.21s 04:52:18 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:52:18 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered NIST_800_190 compliance run 04:52:18 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:52:31 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 13.211s 04:52:31 | INFO | ComplianceTest | ComplianceTest | Validating cluster control PCI_DSS_3_2:2_2 04:52:31 | INFO | ComplianceTest | ComplianceTest | Validating cluster control NIST_800_190:4_3_5 04:52:31 | INFO | ComplianceTest | ComplianceTest | Validating cluster control NIST_800_190:4_4_3 04:52:31 | INFO | ComplianceTest | ComplianceTest | Validating cluster control NIST_800_190:4_5_1 04:52:31 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify controls that rely on CIS Benchmarks PASSED ComplianceTest > Verify Tailored Profile does not have evidence for disabled rule SKIPPED ComplianceTest > Verify Compliance Operator aggregation results on OpenShift for cluster results SKIPPED ComplianceTest > Verify controls that checks for fixable CVEs STANDARD_OUT 04:52:31 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify controls that checks for fixable CVEs 04:52:31 | DEBUG | ComplianceTest | OpenShift | Namespace qa already exists 04:52:31 | DEBUG | ComplianceTest | Kubernetes | Told the orchestrator to createOrReplace cve-compliance-deployment 04:52:31 | DEBUG | ComplianceTest | Kubernetes | Waiting for cve-compliance-deployment to start 04:52:31 | DEBUG | ComplianceTest | Kubernetes | Status of cve-compliance-deployment's pods: 04:52:32 | DEBUG | ComplianceTest | Kubernetes | - cve-compliance-deployment-6b54469594-ltgb8 Container status: [] 04:52:32 | DEBUG | ComplianceTest | Kubernetes | 0/1 are in the ready state for cve-compliance-deployment 04:52:35 | DEBUG | ComplianceTest | Kubernetes | Waiting for cve-compliance-deployment to start 04:52:35 | DEBUG | ComplianceTest | Kubernetes | Status of cve-compliance-deployment's pods: 04:52:35 | DEBUG | ComplianceTest | Kubernetes | - cve-compliance-deployment-6b54469594-ltgb8 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:52:32Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:52:35 | DEBUG | ComplianceTest | Kubernetes | All 1 replicas found in ready state for cve-compliance-deployment 04:52:35 | DEBUG | ComplianceTest | Kubernetes | Took 3 seconds for k8s deployment cve-compliance-deployment 04:52:35 | DEBUG | ComplianceTest | Kubernetes | Updating deployment cve-compliance-deployment with 1 pods 04:52:35 | INFO | ComplianceTest | ComplianceTest | Image not found or not scanned: null 04:52:35 | INFO | ComplianceTest | ComplianceTest | Found scanned image name: "quay.io/rhacs-eng/qa-multi-arch:nginx-1.12@sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728" components: 80 cves: 285 fixable_cves: 151 created { seconds: 1525096632 nanos: 489317377 } id: "sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728" last_updated { seconds: 1764218182 nanos: 109126352 } priority: 4 04:52:35 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:52:35 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered PCI_DSS_3_2 compliance run 04:52:35 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:52:48 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 13.211s 04:52:48 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:52:48 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered HIPAA_164 compliance run 04:52:48 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:53:01 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 13.214s 04:53:01 | INFO | ComplianceTest | ComplianceTest | Validating PCI_DSS_3_2:6_2 04:53:01 | INFO | ComplianceTest | ComplianceTest | Validating HIPAA_164:306_e 04:53:01 | DEBUG | ComplianceTest | Kubernetes | Removed the deployment: cve-compliance-deployment 04:53:01 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify controls that checks for fixable CVEs PASSED ComplianceTest > Verify Compliance aggregation cache cleared after each compliance run STANDARD_OUT 04:53:01 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify Compliance aggregation cache cleared after each compliance run 04:53:01 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:53:01 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered all compliance runs 04:53:01 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the runs to finish... 04:53:15 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance runs took 13.197s 04:53:15 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify Compliance aggregation cache cleared after each compliance run PASSED ComplianceTest > Verify ComplianceRuns with SAC on clusters with wildcard STANDARD_OUT 04:53:15 | INFO | ComplianceTest | ComplianceTest | Starting testcase: Verify ComplianceRuns with SAC on clusters with wildcard 04:53:15 | DEBUG | ComplianceTest | Helpers | Calling services.ComplianceManagementService.triggerComplianceRunsAndWait with 3 retries 04:53:15 | DEBUG | ComplianceTest | ComplianceManagementServi | triggered * compliance run 04:53:15 | DEBUG | ComplianceTest | ComplianceManagementServi | waiting for the run to finish... 04:53:28 | DEBUG | ComplianceTest | ComplianceManagementServi | Compliance run took 13.236s 04:53:28 | INFO | ComplianceTest | RoleService | Deleted role: Compliance Test Automation Role 61c4e1b4-346c-4478-91ac-ef4a9bc886fc and permission set 04:53:28 | INFO | ComplianceTest | ComplianceTest | Ending testcase ComplianceTest > Verify ComplianceRuns with SAC on clusters with wildcard PASSED ComplianceTest STANDARD_OUT 04:53:28 | DEBUG | ComplianceTest | ImageIntegrationService | Image integration deleted: 576471f2-101f-496d-b316-1ed2aff46011 04:53:28 | INFO | ComplianceTest | ComplianceTest | Ending testsuite 04:53:28 | INFO | ComplianceTest | ComplianceTest | Checking if cluster is healthy after test 04:53:28 | DEBUG | ComplianceTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries DefaultPoliciesTest STANDARD_OUT 04:53:28 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testsuite 04:53:29 | DEBUG | DefaultPoliciesTest | ImageIntegrationService | Integration tested: gcr 04:53:29 | DEBUG | DefaultPoliciesTest | ImageIntegrationService | Integration created: gcr: 063e272c-d9e1-4928-8884-5b5bf05acdee 04:53:29 | DEBUG | DefaultPoliciesTest | ImageIntegrationService | Integration found after creation: gcr: 063e272c-d9e1-4928-8884-5b5bf05acdee 04:53:29 | DEBUG | DefaultPoliciesTest | ImageService | Deleted 2 images based on Image:quay.io/rhacs-eng/qa-multi-arch-nginx:latest 04:53:29 | DEBUG | DefaultPoliciesTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:struts-app 04:53:29 | DEBUG | DefaultPoliciesTest | ImageService | Deleted 0 images based on Image:quay.io/rhacs-eng/qa-multi-arch:trigger-policy-violations-most-v1 04:53:29 | DEBUG | DefaultPoliciesTest | ImageService | Deleted 0 images based on Image:us.gcr.io/acs-san-stackroxci/qa-multi-arch:nginx-1.12 04:53:29 | DEBUG | DefaultPoliciesTest | ImageService | Deleted 0 images based on Image:registry.redhat.io/redhat/community-operator-index:v4.19 04:53:29 | DEBUG | DefaultPoliciesTest | ImageService | Deleted 0 images based on Image:quay.io/rhacs-eng/qa:struts-app 04:53:29 | DEBUG | DefaultPoliciesTest | OpenShift | Namespace qa already exists 04:53:29 | DEBUG | DefaultPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace qadefpolnginxlatest 04:53:29 | DEBUG | DefaultPoliciesTest | OpenShift | Namespace qa already exists 04:53:30 | DEBUG | DefaultPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace qadefpolstruts 04:53:30 | DEBUG | DefaultPoliciesTest | OpenShift | Namespace qa already exists 04:53:30 | DEBUG | DefaultPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace qadefpoltriggermost 04:53:30 | DEBUG | DefaultPoliciesTest | OpenShift | Namespace qa already exists 04:53:30 | DEBUG | DefaultPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace qadefpolnginx 04:53:30 | DEBUG | DefaultPoliciesTest | OpenShift | Namespace qa already exists 04:53:30 | DEBUG | DefaultPoliciesTest | Kubernetes | Told the orchestrator to createOrReplace qadefpolunsignedredhat 04:53:30 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolnginxlatest to start 04:53:30 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolnginxlatest's pods: 04:53:30 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolnginxlatest-d556f67bd-khmtr Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:53:30 | DEBUG | DefaultPoliciesTest | Kubernetes | 0/1 are in the ready state for qadefpolnginxlatest 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolnginxlatest to start 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolnginxlatest's pods: 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolnginxlatest-d556f67bd-khmtr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:53:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | All 1 replicas found in ready state for qadefpolnginxlatest 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Took 3 seconds for k8s deployment qadefpolnginxlatest 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Updating deployment qadefpolnginxlatest with 1 pods 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolstruts to start 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolstruts's pods: 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolstruts-5465db9d46-l8xql Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:53:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | All 1 replicas found in ready state for qadefpolstruts 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Took 0 seconds for k8s deployment qadefpolstruts 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Updating deployment qadefpolstruts with 1 pods 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpoltriggermost to start 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpoltriggermost's pods: 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpoltriggermost-768f769d78-5wlhh Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:53:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | All 1 replicas found in ready state for qadefpoltriggermost 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Took 0 seconds for k8s deployment qadefpoltriggermost 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Updating deployment qadefpoltriggermost with 1 pods 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolnginx to start 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolnginx's pods: 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolnginx-c45ff6f46-qlthx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:53:31Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | All 1 replicas found in ready state for qadefpolnginx 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Took 0 seconds for k8s deployment qadefpolnginx 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Updating deployment qadefpolnginx with 1 pods 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolunsignedredhat to start 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolunsignedredhat's pods: 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolunsignedredhat-78d67c6d5d-ff7g4 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:53:33 | DEBUG | DefaultPoliciesTest | Kubernetes | 0/1 are in the ready state for qadefpolunsignedredhat 04:53:36 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolunsignedredhat to start 04:53:36 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolunsignedredhat's pods: 04:53:36 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolunsignedredhat-78d67c6d5d-ff7g4 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:53:36 | DEBUG | DefaultPoliciesTest | Kubernetes | 0/1 are in the ready state for qadefpolunsignedredhat 04:53:39 | DEBUG | DefaultPoliciesTest | Kubernetes | Waiting for qadefpolunsignedredhat to start 04:53:39 | DEBUG | DefaultPoliciesTest | Kubernetes | Status of qadefpolunsignedredhat's pods: 04:53:39 | DEBUG | DefaultPoliciesTest | Kubernetes | - qadefpolunsignedredhat-78d67c6d5d-ff7g4 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:53:38Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:53:39 | DEBUG | DefaultPoliciesTest | Kubernetes | All 1 replicas found in ready state for qadefpolunsignedredhat 04:53:39 | DEBUG | DefaultPoliciesTest | Kubernetes | Took 6 seconds for k8s deployment qadefpolunsignedredhat 04:53:39 | DEBUG | DefaultPoliciesTest | Kubernetes | Updating deployment qadefpolunsignedredhat with 1 pods 04:53:39 | DEBUG | DefaultPoliciesTest | Kubernetes | qadefpolstruts: Service created 04:53:39 | INFO | DefaultPoliciesTest | Services | SR found deployment qadefpolnginxlatest within 0s 04:53:39 | INFO | DefaultPoliciesTest | Services | SR found deployment qadefpolstruts within 0s 04:53:39 | INFO | DefaultPoliciesTest | Services | SR found deployment qadefpoltriggermost within 0s 04:53:39 | INFO | DefaultPoliciesTest | Services | SR found deployment qadefpolnginx within 0s 04:53:39 | INFO | DefaultPoliciesTest | Services | SR found deployment qadefpolunsignedredhat within 0s 04:53:39 | DEBUG | DefaultPoliciesTest | Helpers | Will scan quay.io/rhacs-eng/qa:struts-app to default-policies-test-struts-app.json 04:53:39 | WARN | DefaultPoliciesTest | Helpers | Failed to scan the image. Exit: 1 Stderr: DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Secure Shell (ssh) Port Exposed is triggered STANDARD_OUT 04:53:39 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Secure Shell (ssh) Port Exposed is triggered 04:53:39 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:39 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:53:39 | INFO | DefaultPoliciesTest | Services | Secure Shell (ssh) Port Exposed triggered after waiting 0 seconds 04:53:39 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Secure Shell (ssh) Port Exposed is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Latest tag is triggered STANDARD_OUT 04:53:39 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Latest tag is triggered 04:53:39 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:39 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:53:39 | INFO | DefaultPoliciesTest | Services | Latest tag triggered after waiting 0 seconds 04:53:39 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Latest tag is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Environment Variable Contains Secret is triggered STANDARD_OUT 04:53:39 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Environment Variable Contains Secret is triggered 04:53:40 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:40 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:53:40 | INFO | DefaultPoliciesTest | Services | Environment Variable Contains Secret triggered after waiting 0 seconds 04:53:40 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Environment Variable Contains Secret is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Apache Struts: CVE-2017-5638 is triggered STANDARD_OUT 04:53:40 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Apache Struts: CVE-2017-5638 is triggered 04:53:40 | WARN | DefaultPoliciesTest | DefaultPoliciesTest | [ROX-11612] CVE-2017-5638 is absent from image scan 04:53:40 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:40 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:53:40 | INFO | DefaultPoliciesTest | Services | Apache Struts: CVE-2017-5638 triggered after waiting 0 seconds 04:53:40 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Apache Struts: CVE-2017-5638 is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Wget in Image is triggered STANDARD_OUT 04:53:40 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Wget in Image is triggered 04:53:40 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Temporarily enabled policy 'Wget in Image' 04:53:40 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:43 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:43 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:53:43 | INFO | DefaultPoliciesTest | Services | Wget in Image triggered after waiting 3 seconds 04:53:43 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Re-disabled policy 'Wget in Image' 04:53:43 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:43 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolstruts' has 1 violation(s) for 'Wget in Image' 04:53:46 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:46 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolstruts' has 0 violation(s) for 'Wget in Image' 04:53:46 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Wget in Image is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy 90-Day Image Age is triggered STANDARD_OUT 04:53:46 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy 90-Day Image Age is triggered 04:53:46 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:46 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:53:46 | INFO | DefaultPoliciesTest | Services | 90-Day Image Age triggered after waiting 0 seconds 04:53:46 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy 90-Day Image Age is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Ubuntu Package Manager in Image is triggered STANDARD_OUT 04:53:46 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Ubuntu Package Manager in Image is triggered 04:53:46 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:47 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:53:47 | INFO | DefaultPoliciesTest | Services | Ubuntu Package Manager in Image triggered after waiting 0 seconds 04:53:47 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Ubuntu Package Manager in Image is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Fixable CVSS >= 7 is triggered STANDARD_OUT 04:53:47 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Fixable CVSS >= 7 is triggered 04:53:47 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Temporarily enabled policy 'Fixable CVSS >= 7' 04:53:47 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:50 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:50 | INFO | DefaultPoliciesTest | Services | violation size is: 2 04:53:50 | INFO | DefaultPoliciesTest | Services | Fixable CVSS >= 7 triggered after waiting 3 seconds 04:53:50 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Re-disabled policy 'Fixable CVSS >= 7' 04:53:50 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:50 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolnginx' has 2 violation(s) for 'Fixable CVSS >= 7' 04:53:53 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:53 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolnginx' has 0 violation(s) for 'Fixable CVSS >= 7' 04:53:53 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Fixable CVSS >= 7 is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Curl in Image is triggered STANDARD_OUT 04:53:53 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Curl in Image is triggered 04:53:53 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Temporarily enabled policy 'Curl in Image' 04:53:53 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:56 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:56 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:53:56 | INFO | DefaultPoliciesTest | Services | Curl in Image triggered after waiting 3 seconds 04:53:56 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Re-disabled policy 'Curl in Image' 04:53:56 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:56 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolstruts' has 1 violation(s) for 'Curl in Image' 04:53:59 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:53:59 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolstruts' has 0 violation(s) for 'Curl in Image' 04:53:59 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Curl in Image is triggered PASSED DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Red Hat images must be signed by a Red Hat release key is triggered STANDARD_OUT 04:53:59 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify policy Red Hat images must be signed by a Red Hat release key is triggered 04:53:59 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Temporarily enabled policy 'Red Hat images must be signed by a Red Hat release key' 04:53:59 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:54:02 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:54:02 | INFO | DefaultPoliciesTest | Services | violation size is: 1 04:54:02 | INFO | DefaultPoliciesTest | Services | Red Hat images must be signed by a Red Hat release key triggered after waiting 3 seconds 04:54:03 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Re-disabled policy 'Red Hat images must be signed by a Red Hat release key' 04:54:03 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:54:03 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolunsignedredhat' has 1 violation(s) for 'Red Hat images must be signed by a Red Hat release key' 04:54:06 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:54:06 | INFO | DefaultPoliciesTest | Services | Deployment 'qadefpolunsignedredhat' has 0 violation(s) for 'Red Hat images must be signed by a Red Hat release key' 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify policy #policyName is triggered > Verify policy Red Hat images must be signed by a Red Hat release key is triggered PASSED DefaultPoliciesTest > Verify that Kubernetes Dashboard violation is generated STANDARD_OUT 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify that Kubernetes Dashboard violation is generated 04:54:06 | INFO | DefaultPoliciesTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify that Kubernetes Dashboard violation is generated SKIPPED DefaultPoliciesTest > Notifier for StackRox images with fixable vulns SKIPPED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Policy Violations STANDARD_OUT 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Policy Violations 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 0ms: Policy Violations 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Policy Violations PASSED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Service Reachability STANDARD_OUT 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Service Reachability 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 0ms: Service Reachability 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Service Reachability PASSED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Image Vulnerabilities STANDARD_OUT 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Image Vulnerabilities 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 0ms: Image Vulnerabilities 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Image Vulnerabilities PASSED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Service Configuration STANDARD_OUT 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Service Configuration 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 0ms: Service Configuration 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Service Configuration PASSED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Components Useful for Attackers STANDARD_OUT 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Components Useful for Attackers 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 0ms: Components Useful for Attackers 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Components Useful for Attackers PASSED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Number of Components in Image STANDARD_OUT 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Number of Components in Image 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 0ms: Number of Components in Image 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Number of Components in Image PASSED DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Image Freshness STANDARD_OUT 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify risk factors on struts deployment: Image Freshness 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Risk Factor found in 0ms: Image Freshness 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify risk factors on struts deployment: #riskFactor > Verify risk factors on struts deployment: Image Freshness PASSED DefaultPoliciesTest > Verify that built-in services don't trigger unexpected alerts STANDARD_OUT 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify that built-in services don't trigger unexpected alerts 04:54:06 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getViolations with 3 retries 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify that built-in services don't trigger unexpected alerts PASSED DefaultPoliciesTest > Verify that alert groups API is consistent with alerts STANDARD_OUT 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Starting testcase: Verify that alert groups API is consistent with alerts 04:54:06 | DEBUG | DefaultPoliciesTest | Helpers | Calling services.AlertService.getAlertGroups with 3 retries 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testcase DefaultPoliciesTest > Verify that alert groups API is consistent with alerts PASSED DefaultPoliciesTest STANDARD_OUT 04:54:06 | DEBUG | DefaultPoliciesTest | Kubernetes | Removed the deployment: qadefpolnginxlatest 04:54:06 | DEBUG | DefaultPoliciesTest | Kubernetes | Removed the deployment: qadefpolstruts 04:54:06 | DEBUG | DefaultPoliciesTest | Kubernetes | Removed the deployment: qadefpoltriggermost 04:54:06 | DEBUG | DefaultPoliciesTest | Kubernetes | Removed the deployment: qadefpolnginx 04:54:06 | DEBUG | DefaultPoliciesTest | Kubernetes | Removed the deployment: qadefpolunsignedredhat 04:54:06 | DEBUG | DefaultPoliciesTest | ImageIntegrationService | Image integration deleted: 063e272c-d9e1-4928-8884-5b5bf05acdee 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Ending testsuite 04:54:06 | INFO | DefaultPoliciesTest | DefaultPoliciesTest | Checking if cluster is healthy after test 04:54:06 | DEBUG | DefaultPoliciesTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries DeploymentCheck STANDARD_OUT 04:54:07 | INFO | DeploymentCheck | DeploymentCheck | Starting testsuite 04:54:07 | DEBUG | DeploymentCheck | Kubernetes | check-deployments: NetworkPolicy created: 04:54:07 | DEBUG | DeploymentCheck | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: check-deployments namespace: check-deployments ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: app: check-deployments policyTypes: - Ingress 04:54:07 | DEBUG | DeploymentCheck | Helpers | Caught exception. Retrying in 1s (attempt 0 of 30): io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '8b865d48-b2dd-409e-8e1e-8fdb29316485' does not exist: not found DeploymentCheck > Test Deployment Check - Filtered by Category STANDARD_OUT 04:54:08 | INFO | DeploymentCheck | DeploymentCheck | Starting testcase: Test Deployment Check - Filtered by Category 04:54:08 | INFO | DeploymentCheck | DeploymentCheck | Ending testcase DeploymentCheck > Test Deployment Check - Filtered by Category PASSED DeploymentCheck > Test Deployment Check - Single Deployment STANDARD_OUT 04:54:08 | INFO | DeploymentCheck | DeploymentCheck | Starting testcase: Test Deployment Check - Single Deployment 04:54:11 | INFO | DeploymentCheck | DeploymentCheck | Got remarks: [name: "check-deployments" permission_level: "CLUSTER_ADMIN" applied_network_policies: "check-deployments" ] 04:54:11 | INFO | DeploymentCheck | DeploymentCheck | Ending testcase DeploymentCheck > Test Deployment Check - Single Deployment PASSED DeploymentCheck > Test Deployment Check - Multiple Deployments STANDARD_OUT 04:54:11 | INFO | DeploymentCheck | DeploymentCheck | Starting testcase: Test Deployment Check - Multiple Deployments 04:54:15 | INFO | DeploymentCheck | DeploymentCheck | Got remarks: [name: "check-deployments" permission_level: "CLUSTER_ADMIN" applied_network_policies: "check-deployments" , name: "de2" permission_level: "CLUSTER_ADMIN" ] 04:54:15 | INFO | DeploymentCheck | DeploymentCheck | Ending testcase DeploymentCheck > Test Deployment Check - Multiple Deployments PASSED DeploymentCheck STANDARD_OUT 04:54:15 | DEBUG | DeploymentCheck | Kubernetes | check-deployments: NetworkPolicy removed. 04:54:15 | DEBUG | DeploymentCheck | Kubernetes | Waiting for namespace check-deployments to be deleted 04:54:15 | DEBUG | DeploymentCheck | Kubernetes | Retrying in 3... 04:54:18 | DEBUG | DeploymentCheck | Kubernetes | Retrying in 3... 04:54:21 | DEBUG | DeploymentCheck | Kubernetes | Retrying in 3... 04:54:24 | DEBUG | DeploymentCheck | Kubernetes | K8s found that namespace check-deployments was deleted 04:54:24 | DEBUG | DeploymentCheck | Kubernetes | Waiting for namespace check-deployments to be deleted 04:54:24 | DEBUG | DeploymentCheck | Kubernetes | K8s found that namespace check-deployments was deleted 04:54:24 | INFO | DeploymentCheck | DeploymentCheck | Ending testsuite 04:54:24 | INFO | DeploymentCheck | DeploymentCheck | Checking if cluster is healthy after test 04:54:24 | DEBUG | DeploymentCheck | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries DeploymentEventGraphQLTest STANDARD_OUT 04:54:24 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | Starting testsuite 04:54:24 | DEBUG | DeploymentEventGraphQLTes | OpenShift | Namespace qa already exists 04:54:24 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Told the orchestrator to createOrReplace eventnginx 04:54:24 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Waiting for eventnginx to start 04:54:24 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Status of eventnginx's pods: 04:54:24 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | - eventnginx-5656b489b4-btw8m Container status: [] 04:54:24 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | 0/1 are in the ready state for eventnginx 04:54:27 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Waiting for eventnginx to start 04:54:27 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Status of eventnginx's pods: 04:54:27 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | - eventnginx-5656b489b4-btw8m Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:54:25Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:54:27 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | All 1 replicas found in ready state for eventnginx 04:54:27 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Took 3 seconds for k8s deployment eventnginx 04:54:27 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Updating deployment eventnginx with 1 pods 04:54:27 | INFO | DeploymentEventGraphQLTes | Services | SR found deployment eventnginx within 0s DeploymentEventGraphQLTest > Verify Deployment Events in GraphQL STANDARD_OUT 04:54:27 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | Starting testcase: Verify Deployment Events in GraphQL 04:54:27 | DEBUG | DeploymentEventGraphQLTes | Helpers | Calling services.AlertService.getViolations with 3 retries 04:54:30 | DEBUG | DeploymentEventGraphQLTes | Helpers | Calling services.AlertService.getViolations with 3 retries 04:54:30 | INFO | DeploymentEventGraphQLTes | Services | violation size is: 1 04:54:30 | INFO | DeploymentEventGraphQLTes | Services | Ubuntu Package Manager Execution triggered after waiting 3 seconds 04:55:00 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getDeploymentEventsOverview($deploymentId: ID!) {\n result: deployment(id: $deploymentId) {\n numPolicyViolations: failingRuntimePolicyCount\n numProcessActivities: processActivityCount\n numRestarts: containerRestartCount\n numTerminations: containerTerminationCount\n numTotalPods: podCount\n }\n }","variables":{"deploymentId":"98c53762-e1ed-42db-8e3d-eb57f6ad592d"}} 04:55:00 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":{"numPolicyViolations":1,"numProcessActivities":2,"numRestarts":0,"numTerminations":0,"numTotalPods":1}}} 04:55:01 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:55:01 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: 98c53762-e1ed-42db-8e3d-eb57f6ad592d"}} 04:55:01 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"cb4d1c2c-a511-581a-9d7f-960f4d14bc9a","name":"eventnginx-5656b489b4-btw8m","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-11-27T04:54:29.000715857Z"}]}]}} 04:55:01 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:55:01 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 0 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:55:05 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: 98c53762-e1ed-42db-8e3d-eb57f6ad592d"}} 04:55:05 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"cb4d1c2c-a511-581a-9d7f-960f4d14bc9a","name":"eventnginx-5656b489b4-btw8m","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-11-27T04:54:29.000715857Z"}]}]}} 04:55:05 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:55:05 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 1 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:55:09 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: 98c53762-e1ed-42db-8e3d-eb57f6ad592d"}} 04:55:09 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"cb4d1c2c-a511-581a-9d7f-960f4d14bc9a","name":"eventnginx-5656b489b4-btw8m","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-11-27T04:54:29.000715857Z"}]}]}} 04:55:09 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:55:09 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 2 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:55:13 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: 98c53762-e1ed-42db-8e3d-eb57f6ad592d"}} 04:55:13 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"cb4d1c2c-a511-581a-9d7f-960f4d14bc9a","name":"eventnginx-5656b489b4-btw8m","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-11-27T04:54:29.000715857Z"}]}]}} 04:55:13 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:55:13 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 3 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:55:17 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: 98c53762-e1ed-42db-8e3d-eb57f6ad592d"}} 04:55:17 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"cb4d1c2c-a511-581a-9d7f-960f4d14bc9a","name":"eventnginx-5656b489b4-btw8m","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-11-27T04:54:29.000715857Z"}]}]}} 04:55:17 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:55:17 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 4 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:55:21 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: 98c53762-e1ed-42db-8e3d-eb57f6ad592d"}} 04:55:21 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"cb4d1c2c-a511-581a-9d7f-960f4d14bc9a","name":"eventnginx-5656b489b4-btw8m","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-11-27T04:54:29.000715857Z"}]}]}} 04:55:21 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:55:21 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 5 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:55:25 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: 98c53762-e1ed-42db-8e3d-eb57f6ad592d"}} 04:55:25 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"cb4d1c2c-a511-581a-9d7f-960f4d14bc9a","name":"eventnginx-5656b489b4-btw8m","containerCount":1,"events":[{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-11-27T04:54:29.000715857Z"}]}]}} 04:55:25 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:55:25 | DEBUG | DeploymentEventGraphQLTes | Helpers | Caught exception. Retrying in 4s (attempt 6 of 30): Condition failed with Exception: procEvent.parentName == PARENT_NAME | | null java.lang.NullPointerException: Cannot get property 'parentName' on null object at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy:159) at DeploymentEventGraphQLTest.verifyPodEvents_closure2(DeploymentEventGraphQLTest.groovy) at groovy.lang.Closure.call(Closure.java:433) at groovy.lang.Closure.call(Closure.java:412) at util.Helpers.evaluateWithRetry(Helpers.groovy:32) at util.Helpers.withRetry(Helpers.groovy:42) at DeploymentEventGraphQLTest.verifyPodEvents(DeploymentEventGraphQLTest.groovy:147) at DeploymentEventGraphQLTest.$spock_feature_1_0(DeploymentEventGraphQLTest.groovy:118) 04:55:29 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getPodEvents($podsQuery: String) {\n result: pods(query: $podsQuery) {\n id\n name\n containerCount\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"podsQuery":"Deployment ID: 98c53762-e1ed-42db-8e3d-eb57f6ad592d"}} 04:55:29 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"cb4d1c2c-a511-581a-9d7f-960f4d14bc9a","name":"eventnginx-5656b489b4-btw8m","containerCount":1,"events":[{"__typename":"ProcessActivityEvent","id":"63eb6068-d965-51f6-9f8b-efadeff9e9ac","name":"/bin/sh","timestamp":"2025-11-27T04:54:25.377010568Z","args":"-c apt-get -y clean \u0026\u0026 sleep 600","uid":0,"parentName":null,"parentUid":-1,"inBaseline":true},{"__typename":"ProcessActivityEvent","id":"6b883d00-3aae-58d5-bb96-52ed5b5fbc9e","name":"/usr/bin/apt-get","timestamp":"2025-11-27T04:54:25.377822708Z","args":"-y clean","uid":0,"parentName":"/bin/sh","parentUid":0,"inBaseline":true},{"__typename":"ProcessActivityEvent","id":"bd882d47-7235-5b4f-9443-262ce51c09fd","name":"/bin/sleep","timestamp":"2025-11-27T04:54:25.383675508Z","args":"600","uid":0,"parentName":"/bin/sh","parentUid":0,"inBaseline":true},{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-92a1-42340c759883","name":"Ubuntu Package Manager Execution","timestamp":"2025-11-27T04:54:29.000715857Z"}]}]}} 04:55:29 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:55:29 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL query: {"query":"\n query getContainerEvents($containersQuery: String) {\n result: groupedContainerInstances(query: $containersQuery) {\n id\n podId\n name\n startTime\n events {\n __typename\n id\n name\n timestamp\n ... on ProcessActivityEvent {\n args\n uid\n parentName\n parentUid\n inBaseline\n }\n }\n }\n }","variables":{"containersQuery":"Pod ID: cb4d1c2c-a511-581a-9d7f-960f4d14bc9a"}} 04:55:29 | DEBUG | DeploymentEventGraphQLTes | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"result":[{"id":"eventnginx-5656b489b4-btw8m.qa@cb4d1c2c-a511-581a-9d7f-960f4d14bc9a:eventnginx","podId":"eventnginx-5656b489b4-btw8m.qa@cb4d1c2c-a511-581a-9d7f-960f4d14bc9a","name":"eventnginx","startTime":"2025-11-27T04:54:25Z","events":[{"__typename":"ProcessActivityEvent","id":"63eb6068-d965-51f6-9f8b-efadeff9e9ac","name":"/bin/sh","timestamp":"2025-11-27T04:54:25.377010568Z","args":"-c apt-get -y clean \u0026\u0026 sleep 600","uid":0,"parentName":null,"parentUid":-1,"inBaseline":true},{"__typename":"ProcessActivityEvent","id":"6b883d00-3aae-58d5-bb96-52ed5b5fbc9e","name":"/usr/bin/apt-get","timestamp":"2025-11-27T04:54:25.377822708Z","args":"-y clean","uid":0,"parentName":"/bin/sh","parentUid":0,"inBaseline":true},{"__typename":"ProcessActivityEvent","id":"bd882d47-7235-5b4f-9443-262ce51c09fd","name":"/bin/sleep","timestamp":"2025-11-27T04:54:25.383675508Z","args":"600","uid":0,"parentName":"/bin/sh","parentUid":0,"inBaseline":true},{"__typename":"PolicyViolationEvent","id":"d7a275e1-1bba-47e7-9... 04:55:29 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | return code 200 04:55:29 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | Ending testcase DeploymentEventGraphQLTest > Verify Deployment Events in GraphQL PASSED DeploymentEventGraphQLTest STANDARD_OUT 04:55:29 | DEBUG | DeploymentEventGraphQLTes | Kubernetes | Removed the deployment: eventnginx 04:55:29 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | Ending testsuite 04:55:29 | INFO | DeploymentEventGraphQLTes | DeploymentEventGraphQLTes | Checking if cluster is healthy after test 04:55:29 | DEBUG | DeploymentEventGraphQLTes | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries DeploymentTest STANDARD_OUT 04:55:29 | INFO | DeploymentTest | DeploymentTest | Starting testsuite 04:55:29 | DEBUG | DeploymentTest | OpenShift | Namespace qa already exists 04:55:29 | DEBUG | DeploymentTest | Kubernetes | Told the orchestrator to createOrReplace image-join 04:55:29 | DEBUG | DeploymentTest | Kubernetes | Waiting for image-join to start 04:55:29 | DEBUG | DeploymentTest | Kubernetes | Status of image-join's pods: 04:55:29 | DEBUG | DeploymentTest | Kubernetes | - image-join-7dbf8bd756-j5lnq Container status: [] 04:55:29 | DEBUG | DeploymentTest | Kubernetes | 0/1 are in the ready state for image-join 04:55:32 | DEBUG | DeploymentTest | Kubernetes | Waiting for image-join to start 04:55:32 | DEBUG | DeploymentTest | Kubernetes | Status of image-join's pods: 04:55:32 | DEBUG | DeploymentTest | Kubernetes | - image-join-7dbf8bd756-j5lnq Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:55:30Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:55:32 | DEBUG | DeploymentTest | Kubernetes | All 1 replicas found in ready state for image-join 04:55:32 | DEBUG | DeploymentTest | Kubernetes | Took 3 seconds for k8s deployment image-join 04:55:32 | DEBUG | DeploymentTest | Kubernetes | Updating deployment image-join with 1 pods 04:55:46 | INFO | DeploymentTest | Services | SR found vulnerabilities for the image quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad within 12s DeploymentTest > Verify deployment of type Job is deleted once it completes STANDARD_OUT 04:55:46 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment of type Job is deleted once it completes 04:55:46 | DEBUG | DeploymentTest | OpenShift | Namespace qa already exists 04:55:46 | DEBUG | DeploymentTest | Kubernetes | Told the orchestrator to create job test-job-pi 04:55:46 | INFO | DeploymentTest | Services | SR found deployment test-job-pi within 0s 04:55:53 | INFO | DeploymentTest | Services | SR does not detect the deployment test-job-pi yet: io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id '581f8a9d-5874-4ab7-be47-b79e51cdf7d1' does not exist: not found 04:55:53 | DEBUG | DeploymentTest | Kubernetes | test-job-pi: job removed. 04:55:53 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment of type Job is deleted once it completes PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad STANDARD_OUT 04:55:53 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad 04:55:53 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image Sha:sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e STANDARD_OUT 04:55:53 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Image Sha:sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e 04:55:53 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image Sha:sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links CVE:CVE-2018-18314 STANDARD_OUT 04:55:53 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links CVE:CVE-2018-18314 04:55:53 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links CVE:CVE-2018-18314 PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links CVE:CVE-2018-18314+Fixable:true STANDARD_OUT 04:55:53 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links CVE:CVE-2018-18314+Fixable:true 04:55:53 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links CVE:CVE-2018-18314+Fixable:true PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Deployment:image-join+Image:r/quay.io.* STANDARD_OUT 04:55:53 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Deployment:image-join+Image:r/quay.io.* 04:55:53 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Deployment:image-join+Image:r/quay.io.* PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image:r/quay.io.* STANDARD_OUT 04:55:53 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Image:r/quay.io.* 04:55:53 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image:r/quay.io.* PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image:!stackrox.io STANDARD_OUT 04:55:53 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Image:!stackrox.io 04:55:54 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image:!stackrox.io PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Deployment:image-join+Image:!stackrox.io STANDARD_OUT 04:55:54 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Deployment:image-join+Image:!stackrox.io 04:55:54 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Deployment:image-join+Image:!stackrox.io PASSED DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image Remote:rhacs-eng/qa-multi-arch+Image Registry:quay.io STANDARD_OUT 04:55:54 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify deployment -> image links Image Remote:rhacs-eng/qa-multi-arch+Image Registry:quay.io 04:55:54 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify deployment -> image links #query > Verify deployment -> image links Image Remote:rhacs-eng/qa-multi-arch+Image Registry:quay.io PASSED DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Deployment:image-join STANDARD_OUT 04:55:54 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify image -> deployment links Deployment:image-join 04:55:54 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Deployment:image-join PASSED DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Label:app=test STANDARD_OUT 04:55:54 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify image -> deployment links Label:app=test 04:56:06 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Label:app=test PASSED DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad STANDARD_OUT 04:56:06 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify image -> deployment links Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad 04:56:06 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad PASSED DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Label:app=test+Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad STANDARD_OUT 04:56:06 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify image -> deployment links Label:app=test+Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad 04:56:07 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify image -> deployment links #query > Verify image -> deployment links Label:app=test+Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad PASSED DeploymentTest > Verify GKE orchestrator deployment is marked appropriately > Verify GKE orchestrator deployment is marked appropriately [deploymentName: kube-dns, query: Deployment:kube-dns+Namespace:kube-system, result: true, #0] STANDARD_OUT 04:56:07 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify GKE orchestrator deployment is marked appropriately [deploymentName: kube-dns, query: Deployment:kube-dns+Namespace:kube-system, result: true, #0] 04:56:07 | INFO | DeploymentTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:56:07 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify GKE orchestrator deployment is marked appropriately > Verify GKE orchestrator deployment is marked appropriately [deploymentName: kube-dns, query: Deployment:kube-dns+Namespace:kube-system, result: true, #0] SKIPPED DeploymentTest > Verify GKE orchestrator deployment is marked appropriately > Verify GKE orchestrator deployment is marked appropriately [deploymentName: sensor, query: Deployment:sensor+Namespace:stackrox, result: false, #1] STANDARD_OUT 04:56:07 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify GKE orchestrator deployment is marked appropriately [deploymentName: sensor, query: Deployment:sensor+Namespace:stackrox, result: false, #1] 04:56:07 | INFO | DeploymentTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 04:56:07 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify GKE orchestrator deployment is marked appropriately > Verify GKE orchestrator deployment is marked appropriately [deploymentName: sensor, query: Deployment:sensor+Namespace:stackrox, result: false, #1] SKIPPED DeploymentTest > Verify Openshift orchestrator deployment is marked appropriately > Verify Openshift orchestrator deployment is marked appropriately [deploymentName: apiserver, query: Deployment:apiserver+Namespace:openshift-apiserver, result: true, #0] STANDARD_OUT 04:56:07 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify Openshift orchestrator deployment is marked appropriately [deploymentName: apiserver, query: Deployment:apiserver+Namespace:openshift-apiserver, result: true, #0] 04:56:07 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify Openshift orchestrator deployment is marked appropriately > Verify Openshift orchestrator deployment is marked appropriately [deploymentName: apiserver, query: Deployment:apiserver+Namespace:openshift-apiserver, result: true, #0] PASSED DeploymentTest > Verify Openshift orchestrator deployment is marked appropriately > Verify Openshift orchestrator deployment is marked appropriately [deploymentName: sensor, query: Deployment:sensor+Namespace:stackrox, result: false, #1] STANDARD_OUT 04:56:07 | INFO | DeploymentTest | DeploymentTest | Starting testcase: Verify Openshift orchestrator deployment is marked appropriately [deploymentName: sensor, query: Deployment:sensor+Namespace:stackrox, result: false, #1] 04:56:07 | INFO | DeploymentTest | DeploymentTest | Ending testcase DeploymentTest > Verify Openshift orchestrator deployment is marked appropriately > Verify Openshift orchestrator deployment is marked appropriately [deploymentName: sensor, query: Deployment:sensor+Namespace:stackrox, result: false, #1] PASSED DeploymentTest STANDARD_OUT 04:56:07 | DEBUG | DeploymentTest | Kubernetes | Removed the deployment: image-join 04:56:07 | DEBUG | DeploymentTest | ImageService | Deleted 2 images based on Image:quay.io/rhacs-eng/qa-multi-arch:nginx-204a9a8e65061b10b92ad361dd6f406248404fe60efd5d6a8f2595f18bb37aad 04:56:07 | INFO | DeploymentTest | DeploymentTest | Ending testsuite 04:56:07 | INFO | DeploymentTest | DeploymentTest | Checking if cluster is healthy after test 04:56:07 | DEBUG | DeploymentTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries DiagnosticBundleTest STANDARD_OUT 04:56:07 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Starting testsuite DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download does not succeed without auth STANDARD_OUT 04:56:07 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Starting testcase: Test that diagnostic bundle download does not succeed without auth 04:56:07 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Ending testcase DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download does not succeed without auth PASSED DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download does not succeed with no access token STANDARD_OUT 04:56:07 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Starting testcase: Test that diagnostic bundle download does not succeed with no access token 04:56:07 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Ending testcase DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download does not succeed with no access token PASSED DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download succeeds with debug logs reader token STANDARD_OUT 04:56:07 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Starting testcase: Test that diagnostic bundle download succeeds with debug logs reader token 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file versions.json modified at 2025-11-27T04:56:07Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file logimbue-data.json modified at 2025-11-27T04:56:07Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file auth-providers.json modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file goroutine.txt modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file delegated-scanning-config.json modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file system-configuration.json modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file mutex.pb.gz modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db.json modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file notifiers.json modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file auth-provider-groups.json modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file metrics-1 modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file sensor-metrics/remote/metrics.prom modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file sensor-metrics/remote/heap.pb.gz modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db-pg-stats.json modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file access-control-roles.json modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file heap.pb.gz modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db-pg-analyze-stats.json modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db-pg-tuples.json modified at 2025-11-27T04:56:08Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/namespace-spec.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-d77f6dd-2qv6g.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-d77f6dd-2qv6g-logs-admission-control.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-d77f6dd-h8p6k.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-d77f6dd-h8p6k-logs-admission-control.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-d77f6dd-sn2ts.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-d77f6dd-sn2ts-logs-admission-control.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/pod-central-675967bb95-7rkvx.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/pod-central-675967bb95-7rkvx-logs-central.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/pod-central-db-67998db698-txx99.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/pod-central-db-67998db698-txx99-logs-central-db.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-46897.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-46897-logs-collector.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-46897-logs-compliance.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-46897-logs-node-inventory.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-btw8k.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-btw8k-logs-collector.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-btw8k-logs-compliance.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-btw8k-logs-node-inventory.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-f6grb.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-f6grb-logs-collector.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-f6grb-logs-compliance.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-f6grb-logs-node-inventory.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-gtt9f.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-gtt9f-logs-collector.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-gtt9f-logs-compliance.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-gtt9f-logs-node-inventory.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-k2jf6.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-k2jf6-logs-collector.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-k2jf6-logs-compliance.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-k2jf6-logs-node-inventory.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-vtrn9.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-vtrn9-logs-collector.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-vtrn9-logs-compliance.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-vtrn9-logs-node-inventory.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/pod-config-controller-6d7c65f6b8-c8jh2.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/pod-config-controller-6d7c65f6b8-c8jh2-logs-manager.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/pod-config-controller-6d7c65f6b8-c8jh2-logs-manager-previous.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/pod-scanner-c854f7f8c-jdw9n.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/pod-scanner-c854f7f8c-jdw9n-logs-scanner.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/pod-scanner-db-dd9d94d69-tkm8n.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/pod-scanner-db-dd9d94d69-tkm8n-logs-db.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/pod-sensor-6d955c5b7c-llmc9.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/pod-sensor-6d955c5b7c-llmc9-logs-sensor.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/pod-webhookserver-84f798856c-jjr55.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/pod-webhookserver-84f798856c-jjr55-logs-webhookserver.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/deployment-admission-control.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/deployment-central.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/deployment-central-db.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/deployment-config-controller.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/deployment-scanner.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/deployment-scanner-db.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/deployment-sensor.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/deployment-webhookserver.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/daemonset-collector.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/replicaset-admission-control-d77f6dd.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/replicaset-central-675967bb95.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/replicaset-central-db-67998db698.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/replicaset-config-controller-6d7c65f6b8.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/replicaset-scanner-c854f7f8c.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/replicaset-scanner-db-dd9d94d69.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/replicaset-sensor-6d955c5b7c.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/replicaset-webhookserver-84f798856c.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/configmap-admission-control.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-config.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-db-config.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-endpoints.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-external-db.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-injected-cabundle-stackrox-central-services.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-injected-cabundle-stackrox-secured-cluster-services.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/configmap-kube-root-ca.crt.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/configmap-openshift-service-ca.crt.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-scanner-config.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/configmap-sensor-past-instances.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-stackrox-central-helm.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-stackrox-secured-cluster-helm.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-tls-ca-bundle.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-admission-control.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-central.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-central-db.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-central-loadbalancer.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-scanner.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-scanner-db.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-sensor.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-sensor-webhook.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/service-webhookserver.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/securedcluster-stackrox-secured-cluster-services.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/central-stackrox-central-services.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-admission-control-dockercfg-gr2x7.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-admission-control-tls.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-builder-dockercfg-4lnrx.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-admin-pass.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-db-dockercfg-jcm57.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-db-password.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-db-tls.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-default-tls-secret.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-dockercfg-9jb8p.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-htpasswd.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-monitoring-tls.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-stackrox-central-services-proxy-env.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-tls.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-collector-dockercfg-2wg5p.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-collector-tls.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-config-controller-dockercfg-r5r79.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-default-dockercfg-dn45g.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-deployer-dockercfg-zvd75.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-helm-cluster-config.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-db-password.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-db-tls.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-dockercfg-66ldk.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-tls.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-securedcluster-stackrox-secured-cluster-services-proxy-env.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sensor-dockercfg-qslph.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sensor-monitoring-tls.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sensor-tls.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-service-ca.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sh.helm.release.v1.stackrox-central-services.v1.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sh.helm.release.v1.stackrox-secured-cluster-services.v1.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sh.helm.release.v1.webhookserver.v1.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-stackrox.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-admission-control.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-collector.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner-db.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner-v4-db.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner-v4-indexer.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-sensor.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-webhook-server-certs.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/event-list.csv modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/namespace-spec.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-d77f6dd-2qv6g.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-d77f6dd-2qv6g-logs-admission-control.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-d77f6dd-h8p6k.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-d77f6dd-h8p6k-logs-admission-control.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-d77f6dd-sn2ts.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-d77f6dd-sn2ts-logs-admission-control.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/pod-central-675967bb95-7rkvx.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/pod-central-675967bb95-7rkvx-logs-central.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/pod-central-db-67998db698-txx99.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/pod-central-db-67998db698-txx99-logs-central-db.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-46897.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-46897-logs-collector.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-46897-logs-compliance.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-46897-logs-node-inventory.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-btw8k.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-btw8k-logs-collector.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-btw8k-logs-compliance.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-btw8k-logs-node-inventory.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-f6grb.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-f6grb-logs-collector.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-f6grb-logs-compliance.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-f6grb-logs-node-inventory.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-gtt9f.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-gtt9f-logs-collector.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-gtt9f-logs-compliance.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-gtt9f-logs-node-inventory.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-k2jf6.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-k2jf6-logs-collector.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-k2jf6-logs-compliance.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-k2jf6-logs-node-inventory.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-vtrn9.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-vtrn9-logs-collector.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-vtrn9-logs-compliance.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-vtrn9-logs-node-inventory.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/pod-config-controller-6d7c65f6b8-c8jh2.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/pod-config-controller-6d7c65f6b8-c8jh2-logs-manager.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/pod-config-controller-6d7c65f6b8-c8jh2-logs-manager-previous.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/pod-scanner-c854f7f8c-jdw9n.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/pod-scanner-c854f7f8c-jdw9n-logs-scanner.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/pod-scanner-db-dd9d94d69-tkm8n.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/pod-scanner-db-dd9d94d69-tkm8n-logs-db.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/pod-sensor-6d955c5b7c-llmc9.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/pod-sensor-6d955c5b7c-llmc9-logs-sensor.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/pod-webhookserver-84f798856c-jjr55.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/pod-webhookserver-84f798856c-jjr55-logs-webhookserver.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/deployment-admission-control.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/deployment-central.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/deployment-central-db.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/deployment-config-controller.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/deployment-scanner.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/deployment-scanner-db.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/deployment-sensor.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/deployment-webhookserver.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/daemonset-collector.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/replicaset-admission-control-d77f6dd.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/replicaset-central-675967bb95.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/replicaset-central-db-67998db698.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/replicaset-config-controller-6d7c65f6b8.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/replicaset-scanner-c854f7f8c.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/replicaset-scanner-db-dd9d94d69.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/replicaset-sensor-6d955c5b7c.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/replicaset-webhookserver-84f798856c.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/_ungrouped/configmap-admission-control.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-config.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-db-config.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-endpoints.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-external-db.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-injected-cabundle-stackrox-central-services.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-injected-cabundle-stackrox-secured-cluster-services.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/_ungrouped/configmap-kube-root-ca.crt.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/_ungrouped/configmap-openshift-service-ca.crt.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-scanner-config.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/configmap-sensor-past-instances.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-stackrox-central-helm.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-stackrox-secured-cluster-helm.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-tls-ca-bundle.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-admission-control.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-central.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-central-db.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-central-loadbalancer.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-scanner.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-scanner-db.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-sensor.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-sensor-webhook.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/service-webhookserver.yaml modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/event-list.csv modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/errors.txt modified at 2025-11-27T04:56:12Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file telemetry-data.json modified at 2025-11-27T04:56:28Z 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Ending testcase DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download succeeds with debug logs reader token PASSED DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download succeeds with admin access token STANDARD_OUT 04:56:28 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Starting testcase: Test that diagnostic bundle download succeeds with admin access token 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file versions.json modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file logimbue-data.json modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file auth-providers.json modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file goroutine.txt modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file delegated-scanning-config.json modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file system-configuration.json modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file auth-provider-groups.json modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file mutex.pb.gz modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file notifiers.json modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db.json modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file metrics-1 modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db-pg-stats.json modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file access-control-roles.json modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file sensor-metrics/remote/metrics.prom modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file sensor-metrics/remote/heap.pb.gz modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file heap.pb.gz modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db-pg-analyze-stats.json modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file central-db-pg-tuples.json modified at 2025-11-27T04:56:28Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/namespace-spec.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-d77f6dd-2qv6g.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-d77f6dd-2qv6g-logs-admission-control.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-d77f6dd-h8p6k.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-d77f6dd-h8p6k-logs-admission-control.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-d77f6dd-sn2ts.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/pod-admission-control-d77f6dd-sn2ts-logs-admission-control.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/pod-central-675967bb95-7rkvx.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/pod-central-675967bb95-7rkvx-logs-central.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/pod-central-db-67998db698-txx99.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/pod-central-db-67998db698-txx99-logs-central-db.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-46897.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-46897-logs-collector.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-46897-logs-compliance.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-46897-logs-node-inventory.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-btw8k.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-btw8k-logs-collector.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-btw8k-logs-compliance.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-btw8k-logs-node-inventory.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-f6grb.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-f6grb-logs-collector.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-f6grb-logs-compliance.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-f6grb-logs-node-inventory.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-gtt9f.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-gtt9f-logs-collector.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-gtt9f-logs-compliance.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-gtt9f-logs-node-inventory.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-k2jf6.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-k2jf6-logs-collector.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-k2jf6-logs-compliance.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-k2jf6-logs-node-inventory.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-vtrn9.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-vtrn9-logs-collector.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-vtrn9-logs-compliance.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/pod-collector-vtrn9-logs-node-inventory.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/pod-config-controller-6d7c65f6b8-c8jh2.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/pod-config-controller-6d7c65f6b8-c8jh2-logs-manager.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/pod-config-controller-6d7c65f6b8-c8jh2-logs-manager-previous.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/pod-scanner-c854f7f8c-jdw9n.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/pod-scanner-c854f7f8c-jdw9n-logs-scanner.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/pod-scanner-db-dd9d94d69-tkm8n.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/pod-scanner-db-dd9d94d69-tkm8n-logs-db.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/pod-sensor-6d955c5b7c-llmc9.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/pod-sensor-6d955c5b7c-llmc9-logs-sensor.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/pod-webhookserver-84f798856c-jjr55.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/pod-webhookserver-84f798856c-jjr55-logs-webhookserver.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/deployment-admission-control.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/deployment-central.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/deployment-central-db.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/deployment-config-controller.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/deployment-scanner.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/deployment-scanner-db.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/deployment-sensor.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/deployment-webhookserver.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/collector/daemonset-collector.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/admission-control/replicaset-admission-control-d77f6dd.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central/replicaset-central-675967bb95.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/central-db/replicaset-central-db-67998db698.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/config-controller/replicaset-config-controller-6d7c65f6b8.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner/replicaset-scanner-c854f7f8c.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/scanner-db/replicaset-scanner-db-dd9d94d69.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/replicaset-sensor-6d955c5b7c.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/replicaset-webhookserver-84f798856c.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/configmap-admission-control.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-config.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-db-config.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-endpoints.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-central-external-db.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-injected-cabundle-stackrox-central-services.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-injected-cabundle-stackrox-secured-cluster-services.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/configmap-kube-root-ca.crt.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/configmap-openshift-service-ca.crt.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-scanner-config.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/sensor/configmap-sensor-past-instances.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-stackrox-central-helm.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-stackrox-secured-cluster-helm.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/configmap-tls-ca-bundle.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-admission-control.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-central.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-central-db.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-central-loadbalancer.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-scanner.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-scanner-db.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-sensor.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/service-sensor-webhook.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/webhookserver/service-webhookserver.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/securedcluster-stackrox-secured-cluster-services.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/central-stackrox-central-services.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-admission-control-dockercfg-gr2x7.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-admission-control-tls.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-builder-dockercfg-4lnrx.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-admin-pass.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-db-dockercfg-jcm57.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-db-password.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-db-tls.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-default-tls-secret.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-dockercfg-9jb8p.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-htpasswd.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-monitoring-tls.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-stackrox-central-services-proxy-env.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-central-tls.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-collector-dockercfg-2wg5p.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-collector-tls.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-config-controller-dockercfg-r5r79.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-default-dockercfg-dn45g.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-deployer-dockercfg-zvd75.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-helm-cluster-config.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-db-password.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-db-tls.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-dockercfg-66ldk.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-scanner-tls.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-securedcluster-stackrox-secured-cluster-services-proxy-env.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sensor-dockercfg-qslph.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sensor-monitoring-tls.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sensor-tls.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-service-ca.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sh.helm.release.v1.stackrox-central-services.v1.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sh.helm.release.v1.stackrox-secured-cluster-services.v1.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-sh.helm.release.v1.webhookserver.v1.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-stackrox.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-admission-control.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-collector.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner-db.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner-v4-db.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-scanner-v4-indexer.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/stackrox/secret-tls-cert-sensor.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/_ungrouped/secret-webhook-server-certs.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/remote/stackrox/event-list.csv modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/namespace-spec.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-d77f6dd-2qv6g.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-d77f6dd-2qv6g-logs-admission-control.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-d77f6dd-h8p6k.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-d77f6dd-h8p6k-logs-admission-control.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-d77f6dd-sn2ts.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/pod-admission-control-d77f6dd-sn2ts-logs-admission-control.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/pod-central-675967bb95-7rkvx.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/pod-central-675967bb95-7rkvx-logs-central.txt modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/pod-central-db-67998db698-txx99.yaml modified at 2025-11-27T04:56:32Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/pod-central-db-67998db698-txx99-logs-central-db.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-46897.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-46897-logs-collector.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-46897-logs-compliance.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-46897-logs-node-inventory.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-btw8k.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-btw8k-logs-collector.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-btw8k-logs-compliance.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-btw8k-logs-node-inventory.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-f6grb.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-f6grb-logs-collector.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-f6grb-logs-compliance.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-f6grb-logs-node-inventory.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-gtt9f.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-gtt9f-logs-collector.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-gtt9f-logs-compliance.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-gtt9f-logs-node-inventory.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-k2jf6.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-k2jf6-logs-collector.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-k2jf6-logs-compliance.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-k2jf6-logs-node-inventory.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-vtrn9.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-vtrn9-logs-collector.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-vtrn9-logs-compliance.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/pod-collector-vtrn9-logs-node-inventory.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/pod-config-controller-6d7c65f6b8-c8jh2.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/pod-config-controller-6d7c65f6b8-c8jh2-logs-manager.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/pod-config-controller-6d7c65f6b8-c8jh2-logs-manager-previous.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/pod-scanner-c854f7f8c-jdw9n.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/pod-scanner-c854f7f8c-jdw9n-logs-scanner.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/pod-scanner-db-dd9d94d69-tkm8n.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/pod-scanner-db-dd9d94d69-tkm8n-logs-db.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/pod-sensor-6d955c5b7c-llmc9.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/pod-sensor-6d955c5b7c-llmc9-logs-sensor.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/pod-webhookserver-84f798856c-jjr55.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/pod-webhookserver-84f798856c-jjr55-logs-webhookserver.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/deployment-admission-control.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/deployment-central.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/deployment-central-db.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/deployment-config-controller.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/deployment-scanner.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/deployment-scanner-db.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/deployment-sensor.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/deployment-webhookserver.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/collector/daemonset-collector.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/admission-control/replicaset-admission-control-d77f6dd.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central/replicaset-central-675967bb95.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/central-db/replicaset-central-db-67998db698.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/config-controller/replicaset-config-controller-6d7c65f6b8.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner/replicaset-scanner-c854f7f8c.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/scanner-db/replicaset-scanner-db-dd9d94d69.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/replicaset-sensor-6d955c5b7c.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/replicaset-webhookserver-84f798856c.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/_ungrouped/configmap-admission-control.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-config.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-db-config.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-endpoints.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-central-external-db.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-injected-cabundle-stackrox-central-services.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-injected-cabundle-stackrox-secured-cluster-services.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/_ungrouped/configmap-kube-root-ca.crt.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/_ungrouped/configmap-openshift-service-ca.crt.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-scanner-config.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/sensor/configmap-sensor-past-instances.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-stackrox-central-helm.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-stackrox-secured-cluster-helm.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/configmap-tls-ca-bundle.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-admission-control.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-central.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-central-db.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-central-loadbalancer.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-scanner.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-scanner-db.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-sensor.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/stackrox/service-sensor-webhook.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/webhookserver/service-webhookserver.yaml modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/stackrox/event-list.csv modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file kubernetes/_central-cluster/errors.txt modified at 2025-11-27T04:56:33Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Found file telemetry-data.json modified at 2025-11-27T04:56:49Z 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Ending testcase DiagnosticBundleTest > Test that diagnostic bundle download #desc > Test that diagnostic bundle download succeeds with admin access token PASSED DiagnosticBundleTest STANDARD_OUT 04:56:49 | INFO | DiagnosticBundleTest | RoleService | Deleted role: No Access Test Role - 18480 and permission set 04:56:49 | INFO | DiagnosticBundleTest | RoleService | Deleted role: 202b5b93-903d-4d6a-a3e4-3ada7eb6f8b0 and permission set 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Ending testsuite 04:56:49 | INFO | DiagnosticBundleTest | DiagnosticBundleTest | Checking if cluster is healthy after test 04:56:49 | DEBUG | DiagnosticBundleTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries Enforcement STANDARD_OUT 04:56:49 | INFO | Enforcement | Enforcement | Starting testsuite 04:56:57 | INFO | Enforcement | Enforcement | Waiting for policies to propagate... 04:57:07 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:57:07 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace kill-enforcement-only 04:57:07 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:57:07 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace scale-down-enforcement-only 04:57:07 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:57:07 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace scale-down-enforcement-build-deploy-image 04:57:07 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:57:08 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace scale-down-enforcement-build-deploy-severity 04:57:08 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:57:08 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace node-constraint-enforcement 04:57:08 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:57:08 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace scale-down-and-node-constraint-deployment 04:57:08 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:57:08 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace alert-and-kill-enforcement-baseline-process 04:57:08 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:57:08 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace no-enforcement-on-update 04:57:08 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:57:08 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace no-enforcement-with-bypass-annotation 04:57:08 | DEBUG | Enforcement | Kubernetes | Waiting for kill-enforcement-only to start 04:57:08 | DEBUG | Enforcement | Kubernetes | Status of kill-enforcement-only's pods: 04:57:08 | DEBUG | Enforcement | Kubernetes | - kill-enforcement-only-b556bbbf4-f9m5t Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 04:57:13 | DEBUG | Enforcement | Kubernetes | kill-enforcement-only: deployment created (skipped replica wait). 04:57:13 | DEBUG | Enforcement | Kubernetes | Updating deployment kill-enforcement-only with 1 pods 04:57:13 | DEBUG | Enforcement | Kubernetes | Waiting for scale-down-enforcement-only to start 04:57:13 | DEBUG | Enforcement | Kubernetes | Status of scale-down-enforcement-only's pods: 04:57:13 | DEBUG | Enforcement | Kubernetes | - scale-down-enforcement-only-5d7966f96-xhc4x Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:57:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:57:18 | DEBUG | Enforcement | Kubernetes | scale-down-enforcement-only: deployment created (skipped replica wait). 04:57:18 | DEBUG | Enforcement | Kubernetes | Updating deployment scale-down-enforcement-only with 1 pods 04:57:18 | DEBUG | Enforcement | Kubernetes | Waiting for scale-down-enforcement-build-deploy-image to start 04:57:18 | DEBUG | Enforcement | Kubernetes | Status of scale-down-enforcement-build-deploy-image's pods: 04:57:23 | DEBUG | Enforcement | Kubernetes | scale-down-enforcement-build-deploy-image: deployment created (skipped replica wait). 04:57:23 | DEBUG | Enforcement | Kubernetes | Updating deployment scale-down-enforcement-build-deploy-image with 0 pods 04:57:23 | DEBUG | Enforcement | Kubernetes | Waiting for scale-down-enforcement-build-deploy-severity to start 04:57:23 | DEBUG | Enforcement | Kubernetes | Status of scale-down-enforcement-build-deploy-severity's pods: 04:57:23 | DEBUG | Enforcement | Kubernetes | - scale-down-enforcement-build-deploy-severity-54467d587c-xrzhn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:57:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:57:28 | DEBUG | Enforcement | Kubernetes | scale-down-enforcement-build-deploy-severity: deployment created (skipped replica wait). 04:57:28 | DEBUG | Enforcement | Kubernetes | Updating deployment scale-down-enforcement-build-deploy-severity with 1 pods 04:57:28 | DEBUG | Enforcement | Kubernetes | Waiting for node-constraint-enforcement to start 04:57:28 | DEBUG | Enforcement | Kubernetes | Status of node-constraint-enforcement's pods: 04:57:28 | DEBUG | Enforcement | Kubernetes | - node-constraint-enforcement-5cd6886866-k5bxc Container status: [] 04:57:28 | DEBUG | Enforcement | Kubernetes | - node-constraint-enforcement-c68dd794d-jwjnn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:57:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:57:33 | DEBUG | Enforcement | Kubernetes | node-constraint-enforcement: deployment created (skipped replica wait). 04:57:33 | DEBUG | Enforcement | Kubernetes | Updating deployment node-constraint-enforcement with 2 pods 04:57:33 | DEBUG | Enforcement | Kubernetes | Waiting for scale-down-and-node-constraint-deployment to start 04:57:33 | DEBUG | Enforcement | Kubernetes | Status of scale-down-and-node-constraint-deployment's pods: 04:57:33 | DEBUG | Enforcement | Kubernetes | - scale-down-and-node-constraint-deployment-755d8fd7d5-qf9wb Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:57:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:57:38 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-deployment: deployment created (skipped replica wait). 04:57:38 | DEBUG | Enforcement | Kubernetes | Updating deployment scale-down-and-node-constraint-deployment with 1 pods 04:57:38 | DEBUG | Enforcement | Kubernetes | Waiting for alert-and-kill-enforcement-baseline-process to start 04:57:38 | DEBUG | Enforcement | Kubernetes | Status of alert-and-kill-enforcement-baseline-process's pods: 04:57:38 | DEBUG | Enforcement | Kubernetes | - alert-and-kill-enforcement-baseline-process-6f9db6d8cc-dr67j Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:57:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:57:38 | DEBUG | Enforcement | Kubernetes | All 1 replicas found in ready state for alert-and-kill-enforcement-baseline-process 04:57:38 | DEBUG | Enforcement | Kubernetes | Took 0 seconds for k8s deployment alert-and-kill-enforcement-baseline-process 04:57:38 | DEBUG | Enforcement | Kubernetes | Updating deployment alert-and-kill-enforcement-baseline-process with 1 pods 04:57:38 | DEBUG | Enforcement | Kubernetes | Waiting for no-enforcement-on-update to start 04:57:38 | DEBUG | Enforcement | Kubernetes | Status of no-enforcement-on-update's pods: 04:57:38 | DEBUG | Enforcement | Kubernetes | - no-enforcement-on-update-656bc84d8f-gfn57 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:57:09Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:57:43 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: deployment created (skipped replica wait). 04:57:43 | DEBUG | Enforcement | Kubernetes | Updating deployment no-enforcement-on-update with 1 pods 04:57:43 | DEBUG | Enforcement | Kubernetes | Waiting for no-enforcement-with-bypass-annotation to start 04:57:43 | DEBUG | Enforcement | Kubernetes | Status of no-enforcement-with-bypass-annotation's pods: 04:57:43 | DEBUG | Enforcement | Kubernetes | - no-enforcement-with-bypass-annotation-c95655c6f-sk765 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:57:09Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:57:43 | DEBUG | Enforcement | Kubernetes | All 1 replicas found in ready state for no-enforcement-with-bypass-annotation 04:57:43 | DEBUG | Enforcement | Kubernetes | Took 0 seconds for k8s deployment no-enforcement-with-bypass-annotation 04:57:43 | DEBUG | Enforcement | Kubernetes | Updating deployment no-enforcement-with-bypass-annotation with 1 pods 04:57:43 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:57:43 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to create scale-down-and-node-constraint-daemonset 04:57:43 | DEBUG | Enforcement | Kubernetes | Waiting for scale-down-and-node-constraint-daemonset to start 04:57:43 | DEBUG | Enforcement | Kubernetes | Status of scale-down-and-node-constraint-daemonset's pods: 04:57:48 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-daemonset: daemonset created (skipped replica wait). 04:57:48 | DEBUG | Enforcement | Kubernetes | Updating deployment scale-down-and-node-constraint-daemonset with 3 pods Enforcement > Test Kill Enforcement - Integration STANDARD_OUT 04:57:48 | INFO | Enforcement | Enforcement | Starting testcase: Test Kill Enforcement - Integration 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:49 | INFO | Enforcement | Services | violation size is: 1 04:57:49 | INFO | Enforcement | Services | kill-enforcement-only triggered after waiting 0 seconds 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:57:49 | INFO | Enforcement | Enforcement | checking if kill-enforcement-only-b556bbbf4-f9m5t was killed 04:57:49 | DEBUG | Enforcement | Kubernetes | Could not query K8S for pod details, assuming pod was killed 04:57:49 | INFO | Enforcement | Enforcement | Enforcement took 0.024s 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:49 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Kill Enforcement - Integration PASSED Enforcement > Test Scale-down Enforcement - Integration STANDARD_OUT 04:57:49 | INFO | Enforcement | Enforcement | Starting testcase: Test Scale-down Enforcement - Integration 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:49 | INFO | Enforcement | Services | violation size is: 1 04:57:49 | INFO | Enforcement | Services | scale-down-enforcement-only triggered after waiting 0 seconds 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:57:49 | DEBUG | Enforcement | Kubernetes | scale-down-enforcement-only: Replicas=0 04:57:49 | INFO | Enforcement | Enforcement | Enforcement took 0s 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:49 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Scale-down Enforcement - Integration PASSED Enforcement > Test Scale-down Enforcement - Integration (build,deploy - image tag) STANDARD_OUT 04:57:49 | INFO | Enforcement | Enforcement | Starting testcase: Test Scale-down Enforcement - Integration (build,deploy - image tag) 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:49 | INFO | Enforcement | Services | violation size is: 1 04:57:49 | INFO | Enforcement | Services | scale-down-enforcement-build-deploy-image triggered after waiting 0 seconds 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:57:49 | DEBUG | Enforcement | Kubernetes | scale-down-enforcement-build-deploy-image: Replicas=0 04:57:49 | INFO | Enforcement | Enforcement | Enforcement took 0s 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:49 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Scale-down Enforcement - Integration (build,deploy - image tag) PASSED Enforcement > Test Scale-down Enforcement - Integration (build,deploy - SEVERITY) STANDARD_OUT 04:57:49 | INFO | Enforcement | Enforcement | Starting testcase: Test Scale-down Enforcement - Integration (build,deploy - SEVERITY) 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:49 | INFO | Enforcement | Services | violation size is: 1 04:57:49 | INFO | Enforcement | Services | scale-down-enforcement-build-deploy-severity triggered after waiting 0 seconds 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:57:49 | DEBUG | Enforcement | Kubernetes | scale-down-enforcement-build-deploy-severity: Replicas=0 04:57:49 | INFO | Enforcement | Enforcement | Enforcement took 0s 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:49 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Scale-down Enforcement - Integration (build,deploy - SEVERITY) PASSED Enforcement > Test Node Constraint Enforcement - Integration STANDARD_OUT 04:57:49 | INFO | Enforcement | Enforcement | Starting testcase: Test Node Constraint Enforcement - Integration 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:49 | INFO | Enforcement | Services | violation size is: 1 04:57:49 | INFO | Enforcement | Services | node-constraint-enforcement triggered after waiting 0 seconds 04:57:49 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:57:49 | DEBUG | Enforcement | Kubernetes | node-constraint-enforcement: Host=[BlockedByStackRox:7e96c1fa-4a9c-412c-a56d-0600f6e4d210] 04:57:50 | INFO | Enforcement | Enforcement | Enforcement took 1.02s 04:57:50 | DEBUG | Enforcement | Kubernetes | node-constraint-enforcement: Unavailable Replicas=1 04:57:50 | DEBUG | Enforcement | Kubernetes | node-constraint-enforcement: Replicas=1 04:57:50 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:50 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Node Constraint Enforcement - Integration PASSED Enforcement > Test Fail Build Enforcement - #policyName - Integration (build,deploy) > Test Fail Build Enforcement - fail-build-enforcement-only - Integration (build,deploy) STANDARD_OUT 04:57:50 | INFO | Enforcement | Enforcement | Starting testcase: Test Fail Build Enforcement - fail-build-enforcement-only - Integration (build,deploy) 04:57:50 | INFO | Enforcement | Services | Request scan of quay.io/rhacs-eng/qa:latest with sendNotifications=false 04:57:54 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Fail Build Enforcement - #policyName - Integration (build,deploy) > Test Fail Build Enforcement - fail-build-enforcement-only - Integration (build,deploy) PASSED Enforcement > Test Fail Build Enforcement - #policyName - Integration (build,deploy) > Test Fail Build Enforcement - fail-build-enforcement-with-scale-to-zero - Integration (build,deploy) STANDARD_OUT 04:57:54 | INFO | Enforcement | Enforcement | Starting testcase: Test Fail Build Enforcement - fail-build-enforcement-with-scale-to-zero - Integration (build,deploy) 04:57:54 | INFO | Enforcement | Services | Request scan of quay.io/rhacs-eng/qa:latest with sendNotifications=false 04:57:54 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Fail Build Enforcement - #policyName - Integration (build,deploy) > Test Fail Build Enforcement - fail-build-enforcement-with-scale-to-zero - Integration (build,deploy) PASSED Enforcement > Test Scale-down and Node Constraint Enforcement - Deployment STANDARD_OUT 04:57:54 | INFO | Enforcement | Enforcement | Starting testcase: Test Scale-down and Node Constraint Enforcement - Deployment 04:57:54 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:54 | INFO | Enforcement | Services | violation size is: 1 04:57:54 | INFO | Enforcement | Services | scale-down-and-node-constraint-deployment triggered after waiting 0 seconds 04:57:54 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:57:54 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-deployment: Replicas=0 04:57:54 | INFO | Enforcement | Enforcement | Enforcement took 0s 04:57:54 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-deployment: Host=[:] 04:57:54 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-deployment: Unavailable Replicas=null 04:57:54 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-deployment: Replicas=0 04:57:54 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:54 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Scale-down and Node Constraint Enforcement - Deployment PASSED Enforcement > Test Scale-down and Node Constraint Enforcement - DaemonSet STANDARD_OUT 04:57:54 | INFO | Enforcement | Enforcement | Starting testcase: Test Scale-down and Node Constraint Enforcement - DaemonSet 04:57:54 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:54 | INFO | Enforcement | Services | violation size is: 1 04:57:54 | INFO | Enforcement | Services | scale-down-and-node-constraint-daemonset triggered after waiting 0 seconds 04:57:54 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:57:54 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-daemonset: Host=[BlockedByStackRox:23b9c9ef-9180-4abc-a959-8c5cc19b593a] 04:57:55 | INFO | Enforcement | Enforcement | Enforcement took 1.02s 04:57:55 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-daemonset: Unavailable Replicas=null 04:57:55 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-daemonset: Replicas=0 04:57:55 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-daemonset: Replicas=0 04:57:55 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:57:55 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Scale-down and Node Constraint Enforcement - DaemonSet PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD]:30-Day Scan Age STANDARD_OUT 04:57:55 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [BUILD]:30-Day Scan Age 04:57:56 | INFO | Enforcement | Services | Updated lifecycleStage of '30-Day Scan Age' to [BUILD] 04:57:56 | INFO | Enforcement | Services | Updated lifecycleStage of '30-Day Scan Age' to [DEPLOY] 04:57:56 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD]:30-Day Scan Age PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [DEPLOY]:Latest tag STANDARD_OUT 04:57:56 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [DEPLOY]:Latest tag 04:57:56 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [DEPLOY] 04:57:56 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [BUILD, DEPLOY] 04:57:56 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [DEPLOY]:Latest tag PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, DEPLOY]:Latest tag STANDARD_OUT 04:57:56 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [BUILD, DEPLOY]:Latest tag 04:57:56 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [BUILD, DEPLOY] 04:57:57 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [BUILD, DEPLOY] 04:57:57 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, DEPLOY]:Latest tag PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [RUNTIME]:Ubuntu Package Manager Execution STANDARD_OUT 04:57:57 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [RUNTIME]:Ubuntu Package Manager Execution 04:57:57 | INFO | Enforcement | Services | Updated lifecycleStage of 'Ubuntu Package Manager Execution' to [RUNTIME] 04:57:57 | INFO | Enforcement | Services | Updated lifecycleStage of 'Ubuntu Package Manager Execution' to [RUNTIME] 04:57:57 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [RUNTIME]:Ubuntu Package Manager Execution PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [RUNTIME]:Latest tag STANDARD_OUT 04:57:57 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [RUNTIME]:Latest tag 04:57:57 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: A runtime policy must contain at least one policy criterion from process, network flow, audit log events, or Kubernetes events criteria categories, event source must be deployment or audit event for runtime policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:57:57 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [RUNTIME]:Latest tag PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, RUNTIME]:Latest tag STANDARD_OUT 04:57:57 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [BUILD, RUNTIME]:Latest tag 04:57:57 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: A runtime policy must contain at least one policy criterion from process, network flow, audit log events, or Kubernetes events criteria categories, event source must be deployment or audit event for runtime policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:57:57 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, RUNTIME]:Latest tag PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, RUNTIME]:Ubuntu Package Manager Execution STANDARD_OUT 04:57:57 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [BUILD, RUNTIME]:Ubuntu Package Manager Execution 04:57:57 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: policy configuration is invalid for build time: generating evaluator for policy section "": compiling field query: &{Process Name [r/apt-get|apt|dpkg] Or false false}: invalid query: field Process Name unknown, event source must not be set for build or deploy time policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:57:57 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, RUNTIME]:Ubuntu Package Manager Execution PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [DEPLOY, RUNTIME]:Latest tag STANDARD_OUT 04:57:57 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [DEPLOY, RUNTIME]:Latest tag 04:57:58 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: A runtime policy must contain at least one policy criterion from process, network flow, audit log events, or Kubernetes events criteria categories, event source must be deployment or audit event for runtime policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:57:58 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [DEPLOY, RUNTIME]:Latest tag PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [DEPLOY, RUNTIME]:Ubuntu Package Manager Execution STANDARD_OUT 04:57:58 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [DEPLOY, RUNTIME]:Ubuntu Package Manager Execution 04:57:58 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: deploy time policy cannot contain runtime criteria, event source must not be set for build or deploy time policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:57:58 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [DEPLOY, RUNTIME]:Ubuntu Package Manager Execution PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, DEPLOY, RUNTIME]:Latest tag STANDARD_OUT 04:57:58 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [BUILD, DEPLOY, RUNTIME]:Latest tag 04:57:58 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage error: A runtime policy must contain at least one policy criterion from process, network flow, audit log events, or Kubernetes events criteria categories, event source must be deployment or audit event for runtime policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:57:58 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, DEPLOY, RUNTIME]:Latest tag PASSED Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, DEPLOY, RUNTIME]:Ubuntu Package Manager Execution STANDARD_OUT 04:57:58 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Lifecycle combinations: [BUILD, DEPLOY, RUNTIME]:Ubuntu Package Manager Execution 04:57:58 | WARN | Enforcement | Services | exception io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid errors: [error validating lifecycle stage errors: [policy configuration is invalid for build time: generating evaluator for policy section "": compiling field query: &{Process Name [r/apt-get|apt|dpkg] Or false false}: invalid query: field Process Name unknown, deploy time policy cannot contain runtime criteria], event source must not be set for build or deploy time policies]: invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.putPolicy(PolicyServiceGrpc.java:1032) [3 skipped] at Services.updatePolicyLifecycleStage(Services.groovy:394) at Enforcement.$spock_feature_1_8(Enforcement.groovy:594) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 04:57:58 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Lifecycle combinations: #lifecycles:#policy > Verify Policy Lifecycle combinations: [BUILD, DEPLOY, RUNTIME]:Ubuntu Package Manager Execution PASSED Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [BUILD] STANDARD_OUT 04:57:58 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Enforcement/Lifecycle combinations: [BUILD] 04:57:58 | INFO | Enforcement | Services | Updated lifecycleStage of '30-Day Scan Age' to [BUILD] 04:57:58 | INFO | Enforcement | Services | Updated enforcement of '30-Day Scan Age' to [SCALE_TO_ZERO_ENFORCEMENT, UNSATISFIABLE_NODE_CONSTRAINT_ENFORCEMENT, KILL_POD_ENFORCEMENT, FAIL_BUILD_ENFORCEMENT, FAIL_KUBE_REQUEST_ENFORCEMENT, FAIL_DEPLOYMENT_CREATE_ENFORCEMENT, FAIL_DEPLOYMENT_UPDATE_ENFORCEMENT] 04:57:59 | INFO | Enforcement | Services | Updated lifecycleStage of '30-Day Scan Age' to [DEPLOY] 04:57:59 | INFO | Enforcement | Services | Updated enforcement of '30-Day Scan Age' to have no enforcement actions 04:57:59 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [BUILD] PASSED Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [DEPLOY] STANDARD_OUT 04:57:59 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Enforcement/Lifecycle combinations: [DEPLOY] 04:57:59 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [DEPLOY] 04:58:00 | INFO | Enforcement | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT, UNSATISFIABLE_NODE_CONSTRAINT_ENFORCEMENT, KILL_POD_ENFORCEMENT, FAIL_BUILD_ENFORCEMENT, FAIL_KUBE_REQUEST_ENFORCEMENT, FAIL_DEPLOYMENT_CREATE_ENFORCEMENT, FAIL_DEPLOYMENT_UPDATE_ENFORCEMENT] 04:58:00 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [BUILD, DEPLOY] 04:58:00 | INFO | Enforcement | Services | Updated enforcement of 'Latest tag' to have no enforcement actions 04:58:00 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [DEPLOY] PASSED Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [BUILD, DEPLOY] STANDARD_OUT 04:58:00 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Enforcement/Lifecycle combinations: [BUILD, DEPLOY] 04:58:00 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [BUILD, DEPLOY] 04:58:01 | INFO | Enforcement | Services | Updated enforcement of 'Latest tag' to [SCALE_TO_ZERO_ENFORCEMENT, UNSATISFIABLE_NODE_CONSTRAINT_ENFORCEMENT, KILL_POD_ENFORCEMENT, FAIL_BUILD_ENFORCEMENT, FAIL_KUBE_REQUEST_ENFORCEMENT, FAIL_DEPLOYMENT_CREATE_ENFORCEMENT, FAIL_DEPLOYMENT_UPDATE_ENFORCEMENT] 04:58:01 | INFO | Enforcement | Services | Updated lifecycleStage of 'Latest tag' to [BUILD, DEPLOY] 04:58:01 | INFO | Enforcement | Services | Updated enforcement of 'Latest tag' to have no enforcement actions 04:58:01 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [BUILD, DEPLOY] PASSED Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [RUNTIME] STANDARD_OUT 04:58:01 | INFO | Enforcement | Enforcement | Starting testcase: Verify Policy Enforcement/Lifecycle combinations: [RUNTIME] 04:58:01 | INFO | Enforcement | Services | Updated lifecycleStage of 'Ubuntu Package Manager Execution' to [RUNTIME] 04:58:02 | INFO | Enforcement | Services | Updated enforcement of 'Ubuntu Package Manager Execution' to [SCALE_TO_ZERO_ENFORCEMENT, UNSATISFIABLE_NODE_CONSTRAINT_ENFORCEMENT, KILL_POD_ENFORCEMENT, FAIL_BUILD_ENFORCEMENT, FAIL_KUBE_REQUEST_ENFORCEMENT, FAIL_DEPLOYMENT_CREATE_ENFORCEMENT, FAIL_DEPLOYMENT_UPDATE_ENFORCEMENT] 04:58:02 | INFO | Enforcement | Services | Updated lifecycleStage of 'Ubuntu Package Manager Execution' to [RUNTIME] 04:58:02 | INFO | Enforcement | Services | Updated enforcement of 'Ubuntu Package Manager Execution' to have no enforcement actions 04:58:02 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Verify Policy Enforcement/Lifecycle combinations: #lifecycles > Verify Policy Enforcement/Lifecycle combinations: [RUNTIME] PASSED Enforcement > Test Alert and Kill Pod Enforcement - Baseline Process STANDARD_OUT 04:58:02 | INFO | Enforcement | Enforcement | Starting testcase: Test Alert and Kill Pod Enforcement - Baseline Process 04:58:02 | INFO | Enforcement | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa, 101fd733-c004-4d4f-a702-1fc79f0d89e8, null within 0s 04:58:02 | INFO | Enforcement | Enforcement | id: "DC:669e82d1-a7cf-43f8-a6b4-48c7fd9f6101:qa:101fd733-c004-4d4f-a702-1fc79f0d89e8:alert-and-kill-enforcement-baseline-process" key { deployment_id: "101fd733-c004-4d4f-a702-1fc79f0d89e8" container_name: "alert-and-kill-enforcement-baseline-process" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" } elements { element { process_name: "/usr/sbin/nginx" } auto: true } created { seconds: 1764219482 nanos: 834019179 } stack_rox_locked_timestamp { seconds: 1764219542 nanos: 834019399 } last_update { seconds: 1764219482 nanos: 834019179 } 04:58:12 | DEBUG | Enforcement | Kubernetes | First container in pod alert-and-kill-enforcement-baseline-process-6f9db6d8cc-dr67j is running 04:58:12 | DEBUG | Enforcement | Kubernetes | Exec-ing the following command in pod alert-and-kill-enforcement-baseline-process-6f9db6d8cc-dr67j: [pwd] 04:58:13 | DEBUG | | Kubernetes | Command exited with 0 04:58:13 | DEBUG | | Kubernetes | Websocket response: 1000 null 04:58:13 | DEBUG | Enforcement | Kubernetes | Command status: SUCCESS Stdout: / Stderr: 04:58:13 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:58:13 | INFO | Enforcement | Services | violation size is: 1 04:58:13 | INFO | Enforcement | Services | alert-and-kill-enforcement-baseline-process triggered after waiting 0 seconds 04:58:13 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:58:13 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:58:13 | INFO | Enforcement | Enforcement | checking if alert-and-kill-enforcement-baseline-process-6f9db6d8cc-dr67j was killed 04:58:13 | DEBUG | Enforcement | Kubernetes | Could not query K8S for pod details, assuming pod was killed 04:58:13 | INFO | Enforcement | Enforcement | Enforcement took 0.019s 04:58:13 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:58:13 | DEBUG | Enforcement | Helpers | Calling services.AlertService.resolveAlert with 3 retries 04:58:13 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Alert and Kill Pod Enforcement - Baseline Process PASSED Enforcement > Test Enforcement not done on updated - Integration STANDARD_OUT 04:58:13 | INFO | Enforcement | Enforcement | Starting testcase: Test Enforcement not done on updated - Integration 04:58:13 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:58:13 | INFO | Enforcement | Services | violation size is: 1 04:58:13 | INFO | Enforcement | Services | no-enforcement-on-update triggered after waiting 0 seconds 04:58:13 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=1 04:58:13 | INFO | Enforcement | Services | Updated enforcement of 'no-enforcement-on-update' to [SCALE_TO_ZERO_ENFORCEMENT] 04:58:13 | DEBUG | Enforcement | Kubernetes | Deployment no-enforcement-on-update found in namespace qa. Updating... 04:58:13 | DEBUG | Enforcement | OpenShift | Namespace qa already exists 04:58:13 | DEBUG | Enforcement | Kubernetes | Told the orchestrator to createOrReplace no-enforcement-on-update 04:58:13 | DEBUG | Enforcement | Kubernetes | Waiting for no-enforcement-on-update to start 04:58:13 | DEBUG | Enforcement | Kubernetes | Status of no-enforcement-on-update's pods: 04:58:13 | DEBUG | Enforcement | Kubernetes | - no-enforcement-on-update-656bc84d8f-27fzc Container status: [] 04:58:13 | DEBUG | Enforcement | Kubernetes | - no-enforcement-on-update-656bc84d8f-gfn57 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:57:09Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:58:18 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: deployment created (skipped replica wait). 04:58:18 | DEBUG | Enforcement | Kubernetes | Updating deployment no-enforcement-on-update with 2 pods 04:58:18 | INFO | Enforcement | Enforcement | Verifying that enforcement action was not taken 04:58:18 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:58:19 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:58:20 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:58:21 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:58:22 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:58:23 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:58:24 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:58:25 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:58:26 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:58:27 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:58:28 | DEBUG | Enforcement | Kubernetes | no-enforcement-on-update: Replicas=2 04:58:28 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Enforcement not done on updated - Integration PASSED Enforcement > Test Scale-down Enforcement Ignored due to Bypass Annotation - Integration STANDARD_OUT 04:58:28 | INFO | Enforcement | Enforcement | Starting testcase: Test Scale-down Enforcement Ignored due to Bypass Annotation - Integration 04:58:28 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolations with 3 retries 04:58:28 | INFO | Enforcement | Services | violation size is: 1 04:58:28 | INFO | Enforcement | Services | no-enforcement-with-bypass-annotation triggered after waiting 0 seconds 04:58:28 | DEBUG | Enforcement | Helpers | Calling services.AlertService.getViolation with 3 retries 04:58:28 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:29 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:31 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:32 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:33 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:34 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:35 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:36 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:37 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:38 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:39 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:40 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:41 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:42 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:43 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:44 | DEBUG | Enforcement | Kubernetes | no-enforcement-with-bypass-annotation: Replicas=1 04:58:44 | INFO | Enforcement | Enforcement | Ending testcase Enforcement > Test Scale-down Enforcement Ignored due to Bypass Annotation - Integration PASSED Enforcement STANDARD_OUT 04:58:45 | DEBUG | Enforcement | Kubernetes | Removed the deployment: kill-enforcement-only 04:58:45 | DEBUG | Enforcement | Kubernetes | Removed the deployment: scale-down-enforcement-only 04:58:45 | DEBUG | Enforcement | Kubernetes | Removed the deployment: scale-down-enforcement-build-deploy-image 04:58:45 | DEBUG | Enforcement | Kubernetes | Removed the deployment: scale-down-enforcement-build-deploy-severity 04:58:45 | DEBUG | Enforcement | Kubernetes | Removed the deployment: node-constraint-enforcement 04:58:45 | DEBUG | Enforcement | Kubernetes | Removed the deployment: scale-down-and-node-constraint-deployment 04:58:45 | DEBUG | Enforcement | Kubernetes | Removed the deployment: alert-and-kill-enforcement-baseline-process 04:58:45 | DEBUG | Enforcement | Kubernetes | Removed the deployment: no-enforcement-on-update 04:58:45 | DEBUG | Enforcement | Kubernetes | Removed the deployment: no-enforcement-with-bypass-annotation 04:58:45 | DEBUG | Enforcement | Kubernetes | scale-down-and-node-constraint-daemonset: daemonset removed. 04:58:45 | INFO | Enforcement | Enforcement | Ending testsuite 04:58:45 | INFO | Enforcement | Enforcement | Checking if cluster is healthy after test 04:58:45 | DEBUG | Enforcement | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ExternalNetworkSourcesTest STANDARD_OUT 04:58:45 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Starting testsuite ExternalNetworkSourcesTest > Verify connection to a user created external sources STANDARD_OUT 04:58:45 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Starting testcase: Verify connection to a user created external sources 04:58:45 | DEBUG | ExternalNetworkSourcesTes | OpenShift | Namespace qa already exists 04:58:45 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Told the orchestrator to createOrReplace external-connection 04:58:45 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 04:58:45 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 04:58:45 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-v59vk Container status: [] 04:58:45 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | 0/1 are in the ready state for external-connection 04:58:48 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 04:58:48 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 04:58:48 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-v59vk Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:58:46Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:58:48 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | All 1 replicas found in ready state for external-connection 04:58:48 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Took 3 seconds for k8s deployment external-connection 04:58:48 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Updating deployment external-connection with 1 pods 04:58:48 | INFO | ExternalNetworkSourcesTes | Services | SR found deployment external-connection within 0s 04:58:48 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Create a external source containing Cloudflare's IP address 04:58:48 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 04:58:48 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 04:58:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:53 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:53 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:58 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:58 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:58:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:01 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:01 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:08 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:08 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:09 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:09 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:27 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:27 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:28 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:28 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 3569e24d-7599-4376-a5ff-f8228db5b795, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 04:59:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id 3569e24d-7599-4376-a5ff-f8228db5b795 -> edge target key: 147 04:59:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ 04:59:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1764219580.806943492 04:59:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1764219580.806958823 04:59:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764219580.806985253 04:59:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source 3569e24d-7599-4376-a5ff-f8228db5b795 -> target 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOQ in graph after 51.61s 04:59:40 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Removed the deployment: external-connection 04:59:40 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Ending testcase ExternalNetworkSourcesTest > Verify connection to a user created external sources PASSED ExternalNetworkSourcesTest > Verify flow stays to the smallest subnet possible STANDARD_OUT 04:59:40 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Starting testcase: Verify flow stays to the smallest subnet possible 04:59:40 | DEBUG | ExternalNetworkSourcesTes | OpenShift | Namespace qa already exists 04:59:40 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Told the orchestrator to createOrReplace external-connection 04:59:40 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 04:59:40 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 04:59:40 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-mgs2d Container status: [] 04:59:40 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-v59vk Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:58:46Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:59:40 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | 0/1 are in the ready state for external-connection 04:59:43 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 04:59:43 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 04:59:44 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-mgs2d Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:59:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:59:44 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-v59vk Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:58:46Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 04:59:44 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | All 1 replicas found in ready state for external-connection 04:59:44 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Took 3 seconds for k8s deployment external-connection 04:59:44 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Updating deployment external-connection with 2 pods 04:59:44 | INFO | ExternalNetworkSourcesTes | Services | SR found deployment external-connection within 0s 04:59:44 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Create a smaller network external source containing Cloudflare's IP address 04:59:44 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 04:59:44 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 04:59:44 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Edge from deployment to external source external-source-subnet--223 should exist 04:59:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:47 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:47 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:48 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:48 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:53 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:53 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 04:59:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:01 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:01 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:03 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:03 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:08 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:08 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:09 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:09 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:00:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id c1eb7a1e-0cf1-41c4-8195-521a77a592f8 -> edge target key: 148 05:00:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1764219610.587953636 05:00:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1764219610.588046828 05:00:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764219610.588066368 05:00:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source c1eb7a1e-0cf1-41c4-8195-521a77a592f8 -> target 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA in graph after 26.299s 05:00:10 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Create a supernet external source containing Cloudflare's IP address 05:00:10 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 05:00:10 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 05:00:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xNw 05:00:21 | WARN | ExternalNetworkSourcesTes | NetworkGraphUtil | SR did not detect the edge in Network Flow graph 05:00:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId c1eb7a1e-0cf1-41c4-8195-521a77a592f8, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:00:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id c1eb7a1e-0cf1-41c4-8195-521a77a592f8 -> edge target key: 146 05:00:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA 05:00:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1764219621.397220615 05:00:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764219621.397256655 05:00:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1764219621.397442709 05:00:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source c1eb7a1e-0cf1-41c4-8195-521a77a592f8 -> target 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yOA in graph after 0.047s 05:00:21 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Removed the deployment: external-connection 05:00:21 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Ending testcase ExternalNetworkSourcesTest > Verify flow stays to the smallest subnet possible PASSED ExternalNetworkSourcesTest > Verify flow re-maps to larger subnet when smaller subnet deleted STANDARD_OUT 05:00:21 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Starting testcase: Verify flow re-maps to larger subnet when smaller subnet deleted 05:00:21 | DEBUG | ExternalNetworkSourcesTes | OpenShift | Namespace qa already exists 05:00:21 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Told the orchestrator to createOrReplace external-connection 05:00:21 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 05:00:21 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 05:00:21 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-j2klm Container status: [] 05:00:21 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-mgs2d Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:59:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:00:21 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | 0/1 are in the ready state for external-connection 05:00:24 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 05:00:24 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 05:00:24 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-j2klm Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:00:22Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:00:24 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-mgs2d Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T04:59:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:00:24 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | All 1 replicas found in ready state for external-connection 05:00:24 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Took 3 seconds for k8s deployment external-connection 05:00:24 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Updating deployment external-connection with 2 pods 05:00:24 | INFO | ExternalNetworkSourcesTes | Services | SR found deployment external-connection within 0s 05:00:24 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Get ID of deployment which is communicating the external source 05:00:24 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Create a smaller subnet network entities with Cloudflare's IP address 05:00:24 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 05:00:24 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 05:00:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:28 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:28 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:41 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:41 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:42 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:42 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:43 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:43 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:47 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:47 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:53 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:53 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:58 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:58 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:00:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:01 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:01 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:03 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:03 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:08 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:08 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:01:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id 023d74de-b4ae-4ebb-b35f-90e93d6a0169 -> edge target key: 146 05:01:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw 05:01:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1764219671.77100493 05:01:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764219671.77145933 05:01:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1764219671.77217945 05:01:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source 023d74de-b4ae-4ebb-b35f-90e93d6a0169 -> target 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNw in graph after 46.243s 05:01:11 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Add supernet and remove subnet 05:01:11 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 05:01:11 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 05:01:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:21 | WARN | ExternalNetworkSourcesTes | NetworkGraphUtil | SR did not detect the edge in Network Flow graph 05:01:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 023d74de-b4ae-4ebb-b35f-90e93d6a0169, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:01:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id 023d74de-b4ae-4ebb-b35f-90e93d6a0169 -> edge target key: 147 05:01:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA 05:01:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764219681.904817122 05:01:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1764219681.904851982 05:01:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1764219681.904896383 05:01:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source 023d74de-b4ae-4ebb-b35f-90e93d6a0169 -> target 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOA in graph after 0.052s 05:01:21 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Removed the deployment: external-connection 05:01:21 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Ending testcase ExternalNetworkSourcesTest > Verify flow re-maps to larger subnet when smaller subnet deleted PASSED ExternalNetworkSourcesTest > Verify two flows co-exist if larger network entity added first STANDARD_OUT 05:01:21 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Starting testcase: Verify two flows co-exist if larger network entity added first 05:01:22 | DEBUG | ExternalNetworkSourcesTes | OpenShift | Namespace qa already exists 05:01:22 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Told the orchestrator to createOrReplace external-connection 05:01:22 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 05:01:22 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 05:01:22 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-j2klm Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:00:22Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:01:22 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | 0/1 are in the ready state for external-connection 05:01:25 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Waiting for external-connection to start 05:01:25 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Status of external-connection's pods: 05:01:25 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-j2klm Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:00:22Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:01:25 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | - external-connection-754b48f79b-tl8bp Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:01:22Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:01:25 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | All 1 replicas found in ready state for external-connection 05:01:25 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Took 3 seconds for k8s deployment external-connection 05:01:25 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Updating deployment external-connection with 2 pods 05:01:25 | INFO | ExternalNetworkSourcesTes | Services | SR found deployment external-connection within 0s 05:01:25 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 05:01:25 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 05:01:25 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Verify edge exists from deployment to supernet external source 05:01:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:27 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:27 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:28 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:28 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:35 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:41 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:41 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:42 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:42 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:43 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:43 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:44 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:45 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:46 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:47 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:47 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:48 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:48 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:49 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:50 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:51 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:52 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:53 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:53 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:54 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:55 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:56 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:57 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:01:59 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:00 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:01 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:01 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:02 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:03 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:03 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:04 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:05 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:06 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:07 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:08 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:08 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:09 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:09 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:02:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id 71f3d4b4-5251-484a-82d4-0d4635eb3d66 -> edge target key: 146 05:02:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764219730.583053792 05:02:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1764219730.583054262 05:02:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1764219730.583196725 05:02:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source 71f3d4b4-5251-484a-82d4-0d4635eb3d66 -> target 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ in graph after 45.211s 05:02:10 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Add smaller subnet subnet external source 05:02:10 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.createNetworkEntity with 3 retries 05:02:10 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling services.NetworkGraphService.waitForNetworkEntityOfExternalSource with 24 retries 05:02:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:21 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:22 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:23 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:23 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:24 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:25 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:26 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:27 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:27 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:28 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:28 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:29 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:30 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:31 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:32 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:33 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:34 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:36 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:37 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:38 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:39 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id 71f3d4b4-5251-484a-82d4-0d4635eb3d66 -> edge target key: 148 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764219760.227418071 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1764219760.227502513 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1764219760.227567714 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source 71f3d4b4-5251-484a-82d4-0d4635eb3d66 -> target 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjEuMC8yNg in graph after 29.461s 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id 71f3d4b4-5251-484a-82d4-0d4635eb3d66 -> edge target key: 147 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 65535 L4_PROTOCOL_UDP 1764219695.485587000 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1764219705.74862000 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764219704.988276000 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source 71f3d4b4-5251-484a-82d4-0d4635eb3d66 -> target 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ in graph after 0.051s 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Source Id 71f3d4b4-5251-484a-82d4-0d4635eb3d66 -> edge target key: 148 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> targetId: 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764219704.988276000 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1764219705.74862000 05:02:40 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found source 71f3d4b4-5251-484a-82d4-0d4635eb3d66 -> target 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ in graph after 0.047s 05:02:40 | DEBUG | ExternalNetworkSourcesTes | Helpers | Caught exception. Retrying in 30s (attempt 0 of 20): Condition not satisfied: !NetworkGraphUtil.checkForEdge( entityID1, entityID2, since(sinceSeconds), 10) || | | | | | || | | | | 60 || | | | seconds: 1764219700 || | | 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ || | 71f3d4b4-5251-484a-82d4-0d4635eb3d66 || [objects.Edge@2c13f80a, objects.Edge@6be8b941] |class util.NetworkGraphUtil false 05:03:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:10 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:11 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:12 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:13 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:14 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:15 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:16 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:17 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:18 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:19 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Checking for edge between deployments: sourceId 71f3d4b4-5251-484a-82d4-0d4635eb3d66, targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:20 | DEBUG | ExternalNetworkSourcesTes | NetworkGraphUtil | Found no nodes matching targetId 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101__MS4xLjAuMC8xOQ 05:03:20 | WARN | ExternalNetworkSourcesTes | NetworkGraphUtil | SR did not detect the edge in Network Flow graph 05:03:21 | DEBUG | ExternalNetworkSourcesTes | Kubernetes | Removed the deployment: external-connection 05:03:21 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Ending testcase ExternalNetworkSourcesTest > Verify two flows co-exist if larger network entity added first PASSED ExternalNetworkSourcesTest STANDARD_OUT 05:03:21 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Ending testsuite 05:03:21 | INFO | ExternalNetworkSourcesTes | ExternalNetworkSourcesTes | Checking if cluster is healthy after test 05:03:21 | DEBUG | ExternalNetworkSourcesTes | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries GlobalSearch STANDARD_OUT 05:03:21 | INFO | GlobalSearch | GlobalSearch | Starting testsuite 05:03:21 | DEBUG | GlobalSearch | OpenShift | Namespace qa already exists 05:03:21 | DEBUG | GlobalSearch | Kubernetes | Told the orchestrator to createOrReplace qaglobalsearch 05:03:21 | DEBUG | GlobalSearch | Kubernetes | Waiting for qaglobalsearch to start 05:03:21 | DEBUG | GlobalSearch | Kubernetes | Status of qaglobalsearch's pods: 05:03:21 | DEBUG | GlobalSearch | Kubernetes | - qaglobalsearch-55ff8d7cd6-xw5ls Container status: [] 05:03:21 | DEBUG | GlobalSearch | Kubernetes | 0/1 are in the ready state for qaglobalsearch 05:03:24 | DEBUG | GlobalSearch | Kubernetes | Waiting for qaglobalsearch to start 05:03:24 | DEBUG | GlobalSearch | Kubernetes | Status of qaglobalsearch's pods: 05:03:24 | DEBUG | GlobalSearch | Kubernetes | - qaglobalsearch-55ff8d7cd6-xw5ls Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:03:21Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:03:24 | DEBUG | GlobalSearch | Kubernetes | All 1 replicas found in ready state for qaglobalsearch 05:03:24 | DEBUG | GlobalSearch | Kubernetes | Took 3 seconds for k8s deployment qaglobalsearch 05:03:24 | DEBUG | GlobalSearch | Kubernetes | Updating deployment qaglobalsearch with 1 pods 05:03:24 | INFO | GlobalSearch | Services | SR found deployment qaglobalsearch within 0s 05:03:24 | DEBUG | GlobalSearch | Helpers | Calling services.AlertService.getViolations with 3 retries 05:03:24 | INFO | GlobalSearch | Services | violation size is: 1 05:03:24 | INFO | GlobalSearch | Services | Latest tag triggered after waiting 0 seconds GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Deployment:qaglobalsearch, [DEPLOYMENTS]) STANDARD_OUT 05:03:24 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Deployment:qaglobalsearch, [DEPLOYMENTS]) 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: DEPLOYMENTS: 1 05:03:24 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Deployment:qaglobalsearch, [DEPLOYMENTS]) PASSED GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Image:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, [IMAGES]) STANDARD_OUT 05:03:24 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Image:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, [IMAGES]) 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: IMAGES: 2 05:03:24 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Image:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, [IMAGES]) PASSED GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Violation State:ACTIVE+Policy:Latest, [ALERTS]) STANDARD_OUT 05:03:24 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Violation State:ACTIVE+Policy:Latest, [ALERTS]) 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: ALERTS: 2 05:03:24 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Violation State:ACTIVE+Policy:Latest, [ALERTS]) PASSED GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Deployment:qaglobalsearch, [DEPLOYMENTS, ALERTS]) STANDARD_OUT 05:03:24 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Deployment:qaglobalsearch, [DEPLOYMENTS, ALERTS]) 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: DEPLOYMENTS: 1 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: ALERTS: 7 05:03:24 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Deployment:qaglobalsearch, [DEPLOYMENTS, ALERTS]) PASSED GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Deployment:qaglobalsearch, []) STANDARD_OUT 05:03:24 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Deployment:qaglobalsearch, []) 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: ALERTS: 7 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: IMAGES: 1 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: POLICIES: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: DEPLOYMENTS: 1 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: SECRETS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: CLUSTERS: 1 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: NAMESPACES: 1 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: NODES: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: SERVICE_ACCOUNTS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: ROLES: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: ROLEBINDINGS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: SUBJECTS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: POLICY_CATEGORIES: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: IMAGE_INTEGRATIONS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Deployment:qaglobalsearch, []) PASSED GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Image:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, []) STANDARD_OUT 05:03:24 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Image:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, []) 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: ALERTS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: IMAGES: 2 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: POLICIES: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: DEPLOYMENTS: 1 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: SECRETS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: CLUSTERS: 1 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: NAMESPACES: 1 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: NODES: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: SERVICE_ACCOUNTS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: ROLES: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: ROLEBINDINGS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: SUBJECTS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: POLICY_CATEGORIES: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: IMAGE_INTEGRATIONS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Image:quay.io/rhacs-eng/qa-multi-arch-busybox:latest, []) PASSED GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Subject:system:auth, [SUBJECTS]) STANDARD_OUT 05:03:24 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search (no policies)(Subject:system:auth, [SUBJECTS]) 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: SUBJECTS: 2 05:03:24 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search (no policies)(#query, #searchCategories) > Verify Global search (no policies)(Subject:system:auth, [SUBJECTS]) PASSED GlobalSearch > Verify Global search on policies (#query, #searchCategories) > Verify Global search on policies (Policy:Latest tag, [POLICIES]) STANDARD_OUT 05:03:24 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search on policies (Policy:Latest tag, [POLICIES]) 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: POLICIES: 1 05:03:24 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search on policies (#query, #searchCategories) > Verify Global search on policies (Policy:Latest tag, [POLICIES]) PASSED GlobalSearch > Verify Global search on policies (#query, #searchCategories) > Verify Global search on policies (Policy:Latest tag, []) STANDARD_OUT 05:03:24 | INFO | GlobalSearch | GlobalSearch | Starting testcase: Verify Global search on policies (Policy:Latest tag, []) 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: ALERTS: 7 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: IMAGES: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: POLICIES: 1 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: DEPLOYMENTS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: SECRETS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: CLUSTERS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: NAMESPACES: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: NODES: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: SERVICE_ACCOUNTS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: ROLES: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: ROLEBINDINGS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: SUBJECTS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: POLICY_CATEGORIES: 2 05:03:24 | INFO | GlobalSearch | GlobalSearch | Category: IMAGE_INTEGRATIONS: 0 05:03:24 | INFO | GlobalSearch | GlobalSearch | Ending testcase GlobalSearch > Verify Global search on policies (#query, #searchCategories) > Verify Global search on policies (Policy:Latest tag, []) PASSED GlobalSearch STANDARD_OUT 05:03:24 | DEBUG | GlobalSearch | Kubernetes | Removed the deployment: qaglobalsearch 05:03:24 | INFO | GlobalSearch | GlobalSearch | Ending testsuite 05:03:24 | INFO | GlobalSearch | GlobalSearch | Checking if cluster is healthy after test 05:03:24 | DEBUG | GlobalSearch | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries GraphQLResourcePaginationTest STANDARD_OUT 05:03:24 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testsuite GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination deployment Namespace:stackrox+Deployment:c Sort(Deployment) images STANDARD_OUT 05:03:24 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination deployment Namespace:stackrox+Deployment:c Sort(Deployment) images 05:03:24 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:24 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination deployment Namespace:stackrox+Deployment:c Sort(Deployment) images SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination deployment Namespace:stackrox+Deployment:central Sort(Deployment) secrets STANDARD_OUT 05:03:24 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination deployment Namespace:stackrox+Deployment:central Sort(Deployment) secrets 05:03:24 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:24 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination deployment Namespace:stackrox+Deployment:central Sort(Deployment) secrets SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination cluster Sort(null) subjects STANDARD_OUT 05:03:24 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination cluster Sort(null) subjects 05:03:24 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:24 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination cluster Sort(null) subjects SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination cluster Sort(null) serviceAccounts STANDARD_OUT 05:03:24 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination cluster Sort(null) serviceAccounts 05:03:25 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination cluster Sort(null) serviceAccounts SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination cluster Sort(null) k8sRoles STANDARD_OUT 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination cluster Sort(null) k8sRoles 05:03:25 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination cluster Sort(null) k8sRoles SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination node Sort(null) STANDARD_OUT 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination node Sort(null) 05:03:25 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination node Sort(null) SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination secret Secret:scanner-db-password Sort(null) deployments STANDARD_OUT 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination secret Secret:scanner-db-password Sort(null) deployments 05:03:25 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination secret Secret:scanner-db-password Sort(null) deployments SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination subject Subject:kubelet Sort(null) k8sRoles STANDARD_OUT 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination subject Subject:kubelet Sort(null) k8sRoles 05:03:25 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination subject Subject:kubelet Sort(null) k8sRoles SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination k8sRole Role:system:node-bootstrapper Sort(null) subjects STANDARD_OUT 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination k8sRole Role:system:node-bootstrapper Sort(null) subjects 05:03:25 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination k8sRole Role:system:node-bootstrapper Sort(null) subjects SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination k8sRole Namespace:stackrox+Role:edit Sort(null) serviceAccounts STANDARD_OUT 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination k8sRole Namespace:stackrox+Role:edit Sort(null) serviceAccounts 05:03:25 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination k8sRole Namespace:stackrox+Role:edit Sort(null) serviceAccounts SKIPPED GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination serviceAccount Service Account:"central" Sort(null) k8sRoles STANDARD_OUT 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql/sublist pagination serviceAccount Service Account:"central" Sort(null) k8sRoles 05:03:25 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql/sublist pagination #topResource #topLevelQuery #topLevelSortOptionDesc #subResource > Verify graphql/sublist pagination serviceAccount Service Account:"central" Sort(null) k8sRoles SKIPPED GraphQLResourcePaginationTest > Verify graphql pagination and sublist pagination for namespaces #topLevelQuery #subResource > Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox secrets STANDARD_OUT 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox secrets 05:03:25 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql pagination and sublist pagination for namespaces #topLevelQuery #subResource > Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox secrets SKIPPED GraphQLResourcePaginationTest > Verify graphql pagination and sublist pagination for namespaces #topLevelQuery #subResource > Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox serviceAccounts STANDARD_OUT 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox serviceAccounts 05:03:25 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql pagination and sublist pagination for namespaces #topLevelQuery #subResource > Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox serviceAccounts SKIPPED GraphQLResourcePaginationTest > Verify graphql pagination and sublist pagination for namespaces #topLevelQuery #subResource > Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox k8sRoles STANDARD_OUT 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Starting testcase: Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox k8sRoles 05:03:25 | INFO | GraphQLResourcePagination | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testcase GraphQLResourcePaginationTest > Verify graphql pagination and sublist pagination for namespaces #topLevelQuery #subResource > Verify graphql pagination and sublist pagination for namespaces Namespace:stackrox k8sRoles SKIPPED GraphQLResourcePaginationTest STANDARD_OUT 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Ending testsuite 05:03:25 | INFO | GraphQLResourcePagination | GraphQLResourcePagination | Checking if cluster is healthy after test 05:03:25 | DEBUG | GraphQLResourcePagination | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries GroupsTest STANDARD_OUT 05:03:25 | INFO | GroupsTest | GroupsTest | Starting testsuite 05:03:25 | INFO | GroupsTest | RoleService | Created role: QAGroupTest-Group1 05:03:25 | INFO | GroupsTest | RoleService | Created role: QAGroupTest-Group2 05:03:25 | INFO | GroupsTest | RoleService | Created role: QAGroupTest-Group3 05:03:25 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.createGroup with 3 retries 05:03:25 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 05:03:25 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.createGroup with 3 retries 05:03:25 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 05:03:25 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.createGroup with 3 retries 05:03:25 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries GroupsTest > Test that creating group with invalid role name returns an error STANDARD_OUT 05:03:25 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that creating group with invalid role name returns an error 05:03:25 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that creating group with invalid role name returns an error PASSED GroupsTest > Test that creating group with invalid auth provider id returns an error STANDARD_OUT 05:03:25 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that creating group with invalid auth provider id returns an error 05:03:25 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that creating group with invalid auth provider id returns an error PASSED GroupsTest > Test that updating group with invalid role name returns an error STANDARD_OUT 05:03:25 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that updating group with invalid role name returns an error 05:03:25 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that updating group with invalid role name returns an error PASSED GroupsTest > Test that updating group with invalid auth provider id returns an error STANDARD_OUT 05:03:25 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that updating group with invalid auth provider id returns an error 05:03:25 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that updating group with invalid auth provider id returns an error PASSED GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-1, null, null) STANDARD_OUT 05:03:25 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-1, null, null) 05:03:25 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroup with 3 retries 05:03:25 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 05:03:25 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-1, null, null) PASSED GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (null, foo, bar) STANDARD_OUT 05:03:25 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that GetGroup and GetGroups work correctly with query args (null, foo, bar) 05:03:25 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroup with 3 retries 05:03:25 | DEBUG | GroupsTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: invalid arguments: authprovider ID must be set in {id: "some-id" key: "foo" value: "bar" } 05:03:26 | DEBUG | GroupsTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: invalid arguments: authprovider ID must be set in {id: "some-id" key: "foo" value: "bar" } 05:03:27 | DEBUG | GroupsTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: invalid arguments: authprovider ID must be set in {id: "some-id" key: "foo" value: "bar" } 05:03:28 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 05:03:28 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (null, foo, bar) PASSED GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-1, foo, bar) STANDARD_OUT 05:03:28 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-1, foo, bar) 05:03:28 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroup with 3 retries 05:03:29 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 05:03:29 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-1, foo, bar) PASSED GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-2, null, null) STANDARD_OUT 05:03:29 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-2, null, null) 05:03:29 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroup with 3 retries 05:03:29 | DEBUG | GroupsTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: NOT_FOUND: could not find group some-id 05:03:30 | DEBUG | GroupsTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: NOT_FOUND: could not find group some-id 05:03:31 | DEBUG | GroupsTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: NOT_FOUND: could not find group some-id 05:03:32 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 05:03:32 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-2, null, null) PASSED GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-2, foo, bar) STANDARD_OUT 05:03:32 | INFO | GroupsTest | GroupsTest | Starting testcase: Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-2, foo, bar) 05:03:32 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroup with 3 retries 05:03:32 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.getGroups with 3 retries 05:03:32 | INFO | GroupsTest | GroupsTest | Ending testcase GroupsTest > Test that GetGroup and GetGroups work correctly with query args (#authProviderName, #key, #value) > Test that GetGroup and GetGroups work correctly with query args (groups-test-provider-2, foo, bar) PASSED GroupsTest STANDARD_OUT 05:03:32 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.deleteGroup with 3 retries 05:03:32 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.deleteGroup with 3 retries 05:03:32 | DEBUG | GroupsTest | Helpers | Calling services.GroupService.deleteGroup with 3 retries 05:03:32 | INFO | GroupsTest | RoleService | Deleted role: QAGroupTest-Group1 05:03:32 | INFO | GroupsTest | RoleService | Deleted role: QAGroupTest-Group2 05:03:32 | INFO | GroupsTest | RoleService | Deleted role: QAGroupTest-Group3 05:03:32 | INFO | GroupsTest | GroupsTest | Ending testsuite 05:03:32 | INFO | GroupsTest | GroupsTest | Checking if cluster is healthy after test 05:03:32 | DEBUG | GroupsTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries HelpersTest > Verify Helpers.compareAnnotations() same > Verify Helpers.compareAnnotations() same [orchestratorAnnotations: [same:value], stackroxAnnotations: [same:value], #0] PASSED HelpersTest > Verify Helpers.compareAnnotations() same > Verify Helpers.compareAnnotations() same [orchestratorAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789], stackroxAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789], #1] PASSED HelpersTest > Verify Helpers.compareAnnotations() same > Verify Helpers.compareAnnotations() same [orchestratorAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789], stackroxAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123...], #2] STANDARD_OUT 05:03:32 | INFO | | Helpers | Removing long annotation value from comparison: key: same, length: 500 HelpersTest > Verify Helpers.compareAnnotations() same > Verify Helpers.compareAnnotations() same [orchestratorAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789], stackroxAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123...], #2] PASSED HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:value], stackroxAnnotations: [different key:value], #0] STANDARD_OUT 05:03:32 | INFO | | Helpers | There is an annotation difference HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:value], stackroxAnnotations: [different key:value], #0] PASSED HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [some:value], stackroxAnnotations: [same:different value], #1] STANDARD_OUT 05:03:32 | INFO | | Helpers | There is an annotation difference HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [some:value], stackroxAnnotations: [same:different value], #1] PASSED HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:value], stackroxAnnotations: [same:value, extra:extra], #2] STANDARD_OUT 05:03:32 | INFO | | Helpers | There is an annotation difference HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:value], stackroxAnnotations: [same:value, extra:extra], #2] PASSED HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:value, extra:extra], stackroxAnnotations: [same:value], #3] STANDARD_OUT 05:03:32 | INFO | | Helpers | There is an annotation difference HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:value, extra:extra], stackroxAnnotations: [same:value], #3] PASSED HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789], stackroxAnnotations: [missing:value], #4] PASSED HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123], stackroxAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456...], #5] STANDARD_OUT 05:03:32 | INFO | | Helpers | There is an annotation difference HelpersTest > Verify Helpers.compareAnnotations() differences > Verify Helpers.compareAnnotations() differences [orchestratorAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123], stackroxAnnotations: [same:01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456...], #5] PASSED Gradle Test Executor 5 STANDARD_OUT 05:03:32 | WARN | | Deployment | WARNING: XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets may be subject to rate limiting. Consider making a duplicate at quay.io/rhacs-eng/qa:XXXXXXXXXXXX-dkr-ecr-XXXXXXXXX-amazonaws-com-stackrox-qa-ecr-test-registry-image-no-secrets e.g. (needs write access - ask @eng-staff) docker pull XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets docker tag XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets quay.io/rhacs-eng/qa:XXXXXXXXXXXX-dkr-ecr-XXXXXXXXX-amazonaws-com-stackrox-qa-ecr-test-registry-image-no-secrets docker push quay.io/rhacs-eng/qa:XXXXXXXXXXXX-dkr-ecr-XXXXXXXXX-amazonaws-com-stackrox-qa-ecr-test-registry-image-no-secrets ImageScanningTest STANDARD_OUT 05:03:32 | INFO | ImageScanningTest | ImageScanningTest | Starting testsuite 05:03:37 | DEBUG | ImageScanningTest | Kubernetes | gcr-image-pull-secret: Secret removed. 05:03:37 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 893d29b6-ba5a-4a52-96f2-1f2eb8caca7e 05:03:38 | INFO | ImageScanningTest | OpenShift | Created namespace qa-image-scanning-test 05:03:38 | INFO | ImageScanningTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-image-scanning-test namespace. 05:03:38 | DEBUG | ImageScanningTest | Kubernetes | quay: secret created. 05:03:38 | DEBUG | ImageScanningTest | Kubernetes | default-dockercfg-tkj7v: secret created. 05:03:38 | DEBUG | ImageScanningTest | Kubernetes | redhat-image-pull-secret: secret created. 05:03:38 | DEBUG | ImageScanningTest | Kubernetes | public-dockerhub: secret created. 05:03:38 | DEBUG | ImageScanningTest | OpenShift | Adding system:serviceaccount:qa-image-scanning-test:default to anyuid user list ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - openssl-libs:1:1.0.2k-12.el7 - quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 - RHSA-2019:0483 - 0 STANDARD_OUT 05:03:38 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Stackrox Scanner - openssl-libs:1:1.0.2k-12.el7 - quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 - RHSA-2019:0483 - 0 05:03:38 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:03:38 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 00bf94f1-4311-4d4b-a934-c151dbf38142 05:03:38 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 00bf94f1-4311-4d4b-a934-c151dbf38142 05:03:46 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:03:46 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:04:06 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 05:04:06 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422. 1 -v- 1 05:04:06 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 00bf94f1-4311-4d4b-a934-c151dbf38142 05:04:06 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - openssl-libs:1:1.0.2k-12.el7 - quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 - RHSA-2019:0483 - 0 PASSED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - openssl-libs:1:1.0.2k-12.el7 - quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 - CVE-2018-0735 - 0 STANDARD_OUT 05:04:06 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Stackrox Scanner - openssl-libs:1:1.0.2k-12.el7 - quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 - CVE-2018-0735 - 0 05:04:06 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:04:06 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: d2f4ced5-cb5a-48c4-b19b-59a8a24d0d23 05:04:06 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: d2f4ced5-cb5a-48c4-b19b-59a8a24d0d23 05:04:09 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:04:09 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:04:29 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 05:04:29 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422. 1 -v- 1 05:04:29 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: d2f4ced5-cb5a-48c4-b19b-59a8a24d0d23 05:04:29 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - openssl-libs:1:1.0.2k-12.el7 - quay.io/rhacs-eng/qa-multi-arch:rhel7-minimal-7.5-422 - CVE-2018-0735 - 0 PASSED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - systemd:229-4ubuntu21.29 - quay.io/rhacs-eng/qa:oci-manifest - CVE-2021-33910 - 0 STANDARD_OUT 05:04:29 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Stackrox Scanner - systemd:229-4ubuntu21.29 - quay.io/rhacs-eng/qa:oci-manifest - CVE-2021-33910 - 0 05:04:29 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:04:29 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 4af8d4b7-4012-4542-ae1a-e1e33919501f 05:04:29 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 4af8d4b7-4012-4542-ae1a-e1e33919501f 05:04:33 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:04:33 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:04:53 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:oci-manifest 05:04:53 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa:oci-manifest. 1 -v- 1 05:04:53 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 4af8d4b7-4012-4542-ae1a-e1e33919501f 05:04:53 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - systemd:229-4ubuntu21.29 - quay.io/rhacs-eng/qa:oci-manifest - CVE-2021-33910 - 0 PASSED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - glibc:2.35-0ubuntu3.1 - quay.io/rhacs-eng/qa:list-image-oci-manifest - CVE-2023-4911 - 4 STANDARD_OUT 05:04:53 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Stackrox Scanner - glibc:2.35-0ubuntu3.1 - quay.io/rhacs-eng/qa:list-image-oci-manifest - CVE-2023-4911 - 4 05:04:53 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:04:53 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: b871d075-a9f2-40a5-b908-27d9a4b201ab 05:04:53 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: b871d075-a9f2-40a5-b908-27d9a4b201ab 05:04:57 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:04:57 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:05:17 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:list-image-oci-manifest 05:05:17 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa:list-image-oci-manifest. 1 -v- 1 05:05:17 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: b871d075-a9f2-40a5-b908-27d9a4b201ab 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - glibc:2.35-0ubuntu3.1 - quay.io/rhacs-eng/qa:list-image-oci-manifest - CVE-2023-4911 - 4 PASSED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair Scanner - apt:1.4.8 - quay.io/rhacs-eng/qa:nginx-1-12-1 - CVE-2011-3374 - 0 STANDARD_OUT 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Clair Scanner - apt:1.4.8 - quay.io/rhacs-eng/qa:nginx-1-12-1 - CVE-2011-3374 - 0 05:05:17 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair Scanner - apt:1.4.8 - quay.io/rhacs-eng/qa:nginx-1-12-1 - CVE-2011-3374 - 0 SKIPPED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair Scanner - bash:4.4-5 - quay.io/rhacs-eng/qa:nginx-1-12-1 - CVE-2019-18276 - 0 STANDARD_OUT 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Clair Scanner - bash:4.4-5 - quay.io/rhacs-eng/qa:nginx-1-12-1 - CVE-2019-18276 - 0 05:05:17 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair Scanner - bash:4.4-5 - quay.io/rhacs-eng/qa:nginx-1-12-1 - CVE-2019-18276 - 0 SKIPPED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair v4 Scanner - openssl-libs:1:1.1.1-8.el8 - registry.access.redhat.com/ubi8:8.0-208 - RHSA-2021:1024 - 0 STANDARD_OUT 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Clair v4 Scanner - openssl-libs:1:1.1.1-8.el8 - registry.access.redhat.com/ubi8:8.0-208 - RHSA-2021:1024 - 0 05:05:17 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair v4 Scanner - openssl-libs:1:1.1.1-8.el8 - registry.access.redhat.com/ubi8:8.0-208 - RHSA-2021:1024 - 0 SKIPPED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair v4 Scanner - platform-python-pip:9.0.3-13.el8 - registry.access.redhat.com/ubi8:8.0-208 - RHSA-2020:4432 - 0 STANDARD_OUT 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Clair v4 Scanner - platform-python-pip:9.0.3-13.el8 - registry.access.redhat.com/ubi8:8.0-208 - RHSA-2020:4432 - 0 05:05:17 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Clair v4 Scanner - platform-python-pip:9.0.3-13.el8 - registry.access.redhat.com/ubi8:8.0-208 - RHSA-2020:4432 - 0 SKIPPED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - java-17-openjdk-headless:1:17.0.11.0.9-2.el8.x86_64 - quay.io/rhacs-eng/qa:lineage-jdk-17.0.11 - - 135 STANDARD_OUT 05:05:17 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Stackrox Scanner - java-17-openjdk-headless:1:17.0.11.0.9-2.el8.x86_64 - quay.io/rhacs-eng/qa:lineage-jdk-17.0.11 - - 135 05:05:17 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:05:17 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 756ec2e6-1158-4f44-b966-7cac7546cb7e 05:05:17 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 756ec2e6-1158-4f44-b966-7cac7546cb7e 05:05:24 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:05:24 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:05:44 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:lineage-jdk-17.0.11 05:05:44 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa:lineage-jdk-17.0.11. 1 -v- 1 05:05:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 756ec2e6-1158-4f44-b966-7cac7546cb7e 05:05:44 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - java-17-openjdk-headless:1:17.0.11.0.9-2.el8.x86_64 - quay.io/rhacs-eng/qa:lineage-jdk-17.0.11 - - 135 PASSED ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - java-17-openjdk-headless:1:17.0.13.0.11-3.el8.x86_64 - quay.io/rhacs-eng/qa:lineage-jdk-17.0.13 - - 137 STANDARD_OUT 05:05:44 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Image Scan Results - Stackrox Scanner - java-17-openjdk-headless:1:17.0.13.0.11-3.el8.x86_64 - quay.io/rhacs-eng/qa:lineage-jdk-17.0.13 - - 137 05:05:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:05:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: aed116da-8b97-4a00-9271-90aa49db14f0 05:05:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: aed116da-8b97-4a00-9271-90aa49db14f0 05:05:50 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:05:50 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:06:10 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:lineage-jdk-17.0.13 05:06:10 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa:lineage-jdk-17.0.13. 1 -v- 1 05:06:10 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: aed116da-8b97-4a00-9271-90aa49db14f0 05:06:10 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Image Scan Results - #scanner.name() - #component:#version - #image - #cve - #idx > Verify Image Scan Results - Stackrox Scanner - java-17-openjdk-headless:1:17.0.13.0.11-3.el8.x86_64 - quay.io/rhacs-eng/qa:lineage-jdk-17.0.13 - - 137 PASSED ImageScanningTest > Verify Scan Results from Registries - #registry.name() - #component:#version - #image - #cve - #idx > Verify Scan Results from Registries - Google Artifact Registry - gcc-8:8.3.0-6 - us-west1-docker.pkg.dev/acs-san-stackroxci/artifact-registry-test/nginx:1.17 - CVE-2018-12886 - 0 STANDARD_OUT 05:06:10 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify Scan Results from Registries - Google Artifact Registry - gcc-8:8.3.0-6 - us-west1-docker.pkg.dev/acs-san-stackroxci/artifact-registry-test/nginx:1.17 - CVE-2018-12886 - 0 05:06:10 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:06:10 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 959b6e85-dae7-4249-8c7e-8b9f6e0ceb25 05:06:10 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 959b6e85-dae7-4249-8c7e-8b9f6e0ceb25 05:06:10 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: google-artifact-registry 05:06:11 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: google-artifact-registry: 44d946e5-67e2-41e4-abe9-fc5b15de6572 05:06:11 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: google-artifact-registry: 44d946e5-67e2-41e4-abe9-fc5b15de6572 05:06:16 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:06:16 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:06:36 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:us-west1-docker.pkg.dev/acs-san-stackroxci/artifact-registry-test/nginx:1.17 05:06:36 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:us-west1-docker.pkg.dev/acs-san-stackroxci/artifact-registry-test/nginx:1.17. 1 -v- 1 05:06:36 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 44d946e5-67e2-41e4-abe9-fc5b15de6572 05:06:36 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify Scan Results from Registries - #registry.name() - #component:#version - #image - #cve - #idx > Verify Scan Results from Registries - Google Artifact Registry - gcc-8:8.3.0-6 - us-west1-docker.pkg.dev/acs-san-stackroxci/artifact-registry-test/nginx:1.17 - CVE-2018-12886 - 0 PASSED ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Clair Scanner - image does not exist STANDARD_OUT 05:06:36 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify image scan exceptions - Clair Scanner - image does not exist 05:06:36 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:06:36 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:06:36 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Clair Scanner - image does not exist SKIPPED ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Stackrox Scanner - image does not exist STANDARD_OUT 05:06:36 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify image scan exceptions - Stackrox Scanner - image does not exist 05:06:36 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:06:36 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 7a16525d-d255-4389-9fc5-753b588e0b9b 05:06:36 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 7a16525d-d255-4389-9fc5-753b588e0b9b 05:06:36 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:06:37 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 7a16525d-d255-4389-9fc5-753b588e0b9b 05:06:37 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Stackrox Scanner - image does not exist PASSED ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Clair Scanner - missing required registry STANDARD_OUT 05:06:37 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify image scan exceptions - Clair Scanner - missing required registry 05:06:37 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:06:37 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:06:37 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Clair Scanner - missing required registry SKIPPED ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Stackrox Scanner - missing required registry STANDARD_OUT 05:06:37 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Verify image scan exceptions - Stackrox Scanner - missing required registry 05:06:37 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:06:37 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: eaeeec3b-032b-4971-a13c-fe111aac0f83 05:06:37 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: eaeeec3b-032b-4971-a13c-fe111aac0f83 05:06:37 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:06:37 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: eaeeec3b-032b-4971-a13c-fe111aac0f83 05:06:37 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Verify image scan exceptions - #scanner.name() - #testAspect > Verify image scan exceptions - Stackrox Scanner - missing required registry PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-iam STANDARD_OUT 05:06:37 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - ecr-iam 05:06:37 | INFO | ImageScanningTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:06:37 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:06:37 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-iam SKIPPED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-assume-role STANDARD_OUT 05:06:37 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - ecr-assume-role 05:06:37 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: ecr 05:06:37 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: ecr: 0ee1d867-8aff-4e06-8df7-47ffe198ceea 05:06:37 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: ecr: 0ee1d867-8aff-4e06-8df7-47ffe198ceea 05:06:37 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: secret created. 05:06:57 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:06:58 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace ecr-assume-role--ecr-image-registry-test 05:06:58 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-assume-role--ecr-image-registry-test to start 05:06:58 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-assume-role--ecr-image-registry-test's pods: 05:06:58 | DEBUG | ImageScanningTest | Kubernetes | - ecr-assume-role--ecr-image-registry-test-6d5d8b746d-n28qd Container status: [] 05:06:58 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for ecr-assume-role--ecr-image-registry-test 05:07:01 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-assume-role--ecr-image-registry-test to start 05:07:01 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-assume-role--ecr-image-registry-test's pods: 05:07:01 | DEBUG | ImageScanningTest | Kubernetes | - ecr-assume-role--ecr-image-registry-test-6d5d8b746d-n28qd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:06:59Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:07:01 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for ecr-assume-role--ecr-image-registry-test 05:07:01 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment ecr-assume-role--ecr-image-registry-test 05:07:01 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment ecr-assume-role--ecr-image-registry-test with 1 pods 05:07:01 | INFO | ImageScanningTest | Services | SR found deployment ecr-assume-role--ecr-image-registry-test within 0s 05:07:14 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:07:14 | INFO | ImageScanningTest | Services | violation size is: 1 05:07:14 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:07:14 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:07:14 | INFO | ImageScanningTest | Services | violation size is: 1 05:07:14 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:07:14 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:07:19 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: Secret removed. 05:07:19 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: ecr-assume-role--ecr-image-registry-test 05:07:19 | DEBUG | ImageScanningTest | Kubernetes | ecr-assume-role--ecr-image-registry-test: deployment removed. 05:07:19 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:07:39 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets 05:07:39 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets. 1 -v- 1 05:07:39 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 0ee1d867-8aff-4e06-8df7-47ffe198ceea 05:07:39 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 07522f02-d17c-4be5-865d-bf03cfd36e4a 05:07:39 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-assume-role PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-assume-role-external-id STANDARD_OUT 05:07:39 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - ecr-assume-role-external-id 05:07:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: ecr 05:07:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: ecr: db92d490-0f3f-44b0-83ed-12e3ccc8c1a9 05:07:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: ecr: db92d490-0f3f-44b0-83ed-12e3ccc8c1a9 05:07:40 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: secret created. 05:08:00 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:08:00 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace ecr-assume-role-external-id--ecr-image-registry-test 05:08:00 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-assume-role-external-id--ecr-image-registry-test to start 05:08:00 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-assume-role-external-id--ecr-image-registry-test's pods: 05:08:00 | DEBUG | ImageScanningTest | Kubernetes | - ecr-assume-role-external-id--ecr-image-registry-test-587b8mvd9k Container status: [] 05:08:00 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for ecr-assume-role-external-id--ecr-image-registry-test 05:08:03 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-assume-role-external-id--ecr-image-registry-test to start 05:08:03 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-assume-role-external-id--ecr-image-registry-test's pods: 05:08:03 | DEBUG | ImageScanningTest | Kubernetes | - ecr-assume-role-external-id--ecr-image-registry-test-587b8mvd9k Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:08:01Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:08:03 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for ecr-assume-role-external-id--ecr-image-registry-test 05:08:03 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment ecr-assume-role-external-id--ecr-image-registry-test 05:08:03 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment ecr-assume-role-external-id--ecr-image-registry-test with 1 pods 05:08:03 | INFO | ImageScanningTest | Services | SR found deployment ecr-assume-role-external-id--ecr-image-registry-test within 0s 05:08:16 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:08:16 | INFO | ImageScanningTest | Services | violation size is: 1 05:08:16 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:08:16 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:08:16 | INFO | ImageScanningTest | Services | violation size is: 1 05:08:16 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:08:16 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:08:21 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: Secret removed. 05:08:21 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: ecr-assume-role-external-id--ecr-image-registry-test 05:08:21 | DEBUG | ImageScanningTest | Kubernetes | ecr-assume-role-external-id--ecr-image-registry-test: deployment removed. 05:08:21 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:08:41 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets 05:08:41 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets. 1 -v- 1 05:08:41 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: db92d490-0f3f-44b0-83ed-12e3ccc8c1a9 05:08:41 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 9381745a-50ba-4be9-8b6a-fc09e06a8cbc 05:08:41 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-assume-role-external-id PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-auto STANDARD_OUT 05:08:41 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - ecr-auto 05:08:41 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: secret created. 05:09:01 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:09:01 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace ecr-auto--ecr-image-registry-test 05:09:01 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-auto--ecr-image-registry-test to start 05:09:01 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-auto--ecr-image-registry-test's pods: 05:09:01 | DEBUG | ImageScanningTest | Kubernetes | - ecr-auto--ecr-image-registry-test-6655d6c4cb-6fx9q Container status: [] 05:09:01 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for ecr-auto--ecr-image-registry-test 05:09:04 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-auto--ecr-image-registry-test to start 05:09:05 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-auto--ecr-image-registry-test's pods: 05:09:05 | DEBUG | ImageScanningTest | Kubernetes | - ecr-auto--ecr-image-registry-test-6655d6c4cb-6fx9q Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:09:02Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:09:05 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for ecr-auto--ecr-image-registry-test 05:09:05 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment ecr-auto--ecr-image-registry-test 05:09:05 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment ecr-auto--ecr-image-registry-test with 1 pods 05:09:05 | INFO | ImageScanningTest | Services | SR found deployment ecr-auto--ecr-image-registry-test within 0s 05:09:17 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:09:17 | INFO | ImageScanningTest | Services | violation size is: 1 05:09:17 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:09:17 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:09:17 | INFO | ImageScanningTest | Services | violation size is: 1 05:09:17 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:09:17 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:09:22 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: Secret removed. 05:09:22 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: ecr-auto--ecr-image-registry-test 05:09:22 | DEBUG | ImageScanningTest | Kubernetes | ecr-auto--ecr-image-registry-test: deployment removed. 05:09:22 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:09:42 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets 05:09:42 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets. 1 -v- 1 05:09:42 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: d9aa32f4-aefb-42b3-8f50-7f03d02b6e5e 05:09:42 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-auto PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-auto-and-config STANDARD_OUT 05:09:42 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - ecr-auto-and-config 05:09:42 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: ecr 05:09:43 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: ecr: 6ba25348-0129-40a0-af06-862963836ae1 05:09:43 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: ecr: 6ba25348-0129-40a0-af06-862963836ae1 05:09:43 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: secret created. 05:10:03 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:10:03 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace ecr-auto-and-config--ecr-image-registry-test 05:10:03 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-auto-and-config--ecr-image-registry-test to start 05:10:03 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-auto-and-config--ecr-image-registry-test's pods: 05:10:03 | DEBUG | ImageScanningTest | Kubernetes | - ecr-auto-and-config--ecr-image-registry-test-54bdbbf8-ngfpv Container status: [] 05:10:03 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for ecr-auto-and-config--ecr-image-registry-test 05:10:06 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-auto-and-config--ecr-image-registry-test to start 05:10:06 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-auto-and-config--ecr-image-registry-test's pods: 05:10:06 | DEBUG | ImageScanningTest | Kubernetes | - ecr-auto-and-config--ecr-image-registry-test-54bdbbf8-ngfpv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:10:03Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:10:06 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for ecr-auto-and-config--ecr-image-registry-test 05:10:06 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment ecr-auto-and-config--ecr-image-registry-test 05:10:06 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment ecr-auto-and-config--ecr-image-registry-test with 1 pods 05:10:06 | INFO | ImageScanningTest | Services | SR found deployment ecr-auto-and-config--ecr-image-registry-test within 0s 05:10:18 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:10:18 | INFO | ImageScanningTest | Services | violation size is: 1 05:10:18 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:10:18 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:10:18 | INFO | ImageScanningTest | Services | violation size is: 1 05:10:18 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:10:18 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:10:23 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: Secret removed. 05:10:23 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: ecr-auto-and-config--ecr-image-registry-test 05:10:23 | DEBUG | ImageScanningTest | Kubernetes | ecr-auto-and-config--ecr-image-registry-test: deployment removed. 05:10:23 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:10:43 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets 05:10:43 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets. 1 -v- 1 05:10:43 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 6ba25348-0129-40a0-af06-862963836ae1 05:10:43 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 41c83d77-29aa-4a48-93c6-a41669c7aea0 05:10:43 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-auto-and-config PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-config-only STANDARD_OUT 05:10:43 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - ecr-config-only 05:10:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: ecr 05:10:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: ecr: b8b19e3e-3bcd-40b9-aba5-155019000de9 05:10:44 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: ecr: b8b19e3e-3bcd-40b9-aba5-155019000de9 05:10:44 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: secret created. 05:11:04 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 2f1d54f3-9662-4f2c-8d32-5b891562a2ff 05:11:04 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:11:04 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace ecr-config-only--ecr-image-registry-test 05:11:04 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-config-only--ecr-image-registry-test to start 05:11:04 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-config-only--ecr-image-registry-test's pods: 05:11:04 | DEBUG | ImageScanningTest | Kubernetes | - ecr-config-only--ecr-image-registry-test-56f9667d84-rl2l9 Container status: [] 05:11:04 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for ecr-config-only--ecr-image-registry-test 05:11:07 | DEBUG | ImageScanningTest | Kubernetes | Waiting for ecr-config-only--ecr-image-registry-test to start 05:11:07 | DEBUG | ImageScanningTest | Kubernetes | Status of ecr-config-only--ecr-image-registry-test's pods: 05:11:07 | DEBUG | ImageScanningTest | Kubernetes | - ecr-config-only--ecr-image-registry-test-56f9667d84-rl2l9 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:11:05Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:11:07 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for ecr-config-only--ecr-image-registry-test 05:11:07 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment ecr-config-only--ecr-image-registry-test 05:11:07 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment ecr-config-only--ecr-image-registry-test with 1 pods 05:11:07 | INFO | ImageScanningTest | Services | SR found deployment ecr-config-only--ecr-image-registry-test within 0s 05:11:20 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:11:20 | INFO | ImageScanningTest | Services | violation size is: 1 05:11:20 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:11:20 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:11:20 | INFO | ImageScanningTest | Services | violation size is: 1 05:11:20 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:11:20 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:11:25 | DEBUG | ImageScanningTest | Kubernetes | ecr-image-registry-test: Secret removed. 05:11:25 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: ecr-config-only--ecr-image-registry-test 05:11:25 | DEBUG | ImageScanningTest | Kubernetes | ecr-config-only--ecr-image-registry-test: deployment removed. 05:11:25 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:11:45 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets 05:11:45 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:XXXXXXXXXXXX.dkr.ecr.XXXXXXXXX.amazonaws.com/stackrox-qa-ecr-test:registry-image-no-secrets. 1 -v- 1 05:11:45 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: b8b19e3e-3bcd-40b9-aba5-155019000de9 05:11:45 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - ecr-config-only PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - acr-auto STANDARD_OUT 05:11:45 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - acr-auto 05:11:45 | DEBUG | ImageScanningTest | Kubernetes | acr-image-registry-test: secret created. 05:12:05 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:12:05 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace acr-auto--acr-image-registry-test 05:12:05 | DEBUG | ImageScanningTest | Kubernetes | Waiting for acr-auto--acr-image-registry-test to start 05:12:05 | DEBUG | ImageScanningTest | Kubernetes | Status of acr-auto--acr-image-registry-test's pods: 05:12:05 | DEBUG | ImageScanningTest | Kubernetes | - acr-auto--acr-image-registry-test-67d59bfb85-qrjxl Container status: [] 05:12:05 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for acr-auto--acr-image-registry-test 05:12:08 | DEBUG | ImageScanningTest | Kubernetes | Waiting for acr-auto--acr-image-registry-test to start 05:12:08 | DEBUG | ImageScanningTest | Kubernetes | Status of acr-auto--acr-image-registry-test's pods: 05:12:09 | DEBUG | ImageScanningTest | Kubernetes | - acr-auto--acr-image-registry-test-67d59bfb85-qrjxl Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:12:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:12:09 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for acr-auto--acr-image-registry-test 05:12:09 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment acr-auto--acr-image-registry-test 05:12:09 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment acr-auto--acr-image-registry-test with 1 pods 05:12:09 | INFO | ImageScanningTest | Services | SR found deployment acr-auto--acr-image-registry-test within 0s 05:12:22 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:12:22 | INFO | ImageScanningTest | Services | violation size is: 1 05:12:22 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:12:22 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:12:22 | INFO | ImageScanningTest | Services | violation size is: 1 05:12:22 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:12:22 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:12:27 | DEBUG | ImageScanningTest | Kubernetes | acr-image-registry-test: Secret removed. 05:12:27 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: acr-auto--acr-image-registry-test 05:12:27 | DEBUG | ImageScanningTest | Kubernetes | acr-auto--acr-image-registry-test: deployment removed. 05:12:27 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:12:47 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:stackroxci.azurecr.io/stackroxci/registry-image:0.3 05:12:47 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:stackroxci.azurecr.io/stackroxci/registry-image:0.3. 1 -v- 1 05:12:47 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: f7b0af38-46c9-403d-89cf-e80c6053611a 05:12:47 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - acr-auto PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - acr-auto-and-config STANDARD_OUT 05:12:47 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - acr-auto-and-config 05:12:47 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: acr 05:12:47 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: acr: 194d55ab-d744-4665-8a15-361cb768d294 05:12:47 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: acr: 194d55ab-d744-4665-8a15-361cb768d294 05:12:47 | DEBUG | ImageScanningTest | Kubernetes | acr-image-registry-test: secret created. 05:13:07 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:13:07 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace acr-auto-and-config--acr-image-registry-test 05:13:07 | DEBUG | ImageScanningTest | Kubernetes | Waiting for acr-auto-and-config--acr-image-registry-test to start 05:13:07 | DEBUG | ImageScanningTest | Kubernetes | Status of acr-auto-and-config--acr-image-registry-test's pods: 05:13:08 | DEBUG | ImageScanningTest | Kubernetes | - acr-auto-and-config--acr-image-registry-test-86cd8bc56c-hgknq Container status: [] 05:13:08 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for acr-auto-and-config--acr-image-registry-test 05:13:11 | DEBUG | ImageScanningTest | Kubernetes | Waiting for acr-auto-and-config--acr-image-registry-test to start 05:13:11 | DEBUG | ImageScanningTest | Kubernetes | Status of acr-auto-and-config--acr-image-registry-test's pods: 05:13:11 | DEBUG | ImageScanningTest | Kubernetes | - acr-auto-and-config--acr-image-registry-test-86cd8bc56c-hgknq Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:13:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:13:11 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for acr-auto-and-config--acr-image-registry-test 05:13:11 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment acr-auto-and-config--acr-image-registry-test 05:13:11 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment acr-auto-and-config--acr-image-registry-test with 1 pods 05:13:11 | INFO | ImageScanningTest | Services | SR found deployment acr-auto-and-config--acr-image-registry-test within 0s 05:13:24 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:13:24 | INFO | ImageScanningTest | Services | violation size is: 1 05:13:24 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:13:24 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:13:24 | INFO | ImageScanningTest | Services | violation size is: 1 05:13:24 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:13:24 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:13:29 | DEBUG | ImageScanningTest | Kubernetes | acr-image-registry-test: Secret removed. 05:13:29 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: acr-auto-and-config--acr-image-registry-test 05:13:29 | DEBUG | ImageScanningTest | Kubernetes | acr-auto-and-config--acr-image-registry-test: deployment removed. 05:13:29 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:13:49 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:stackroxci.azurecr.io/stackroxci/registry-image:0.3 05:13:49 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:stackroxci.azurecr.io/stackroxci/registry-image:0.3. 1 -v- 1 05:13:49 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 194d55ab-d744-4665-8a15-361cb768d294 05:13:49 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 3f8dcb8e-b46a-4cd9-a4d4-ab38b43e3b6f 05:13:49 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - acr-auto-and-config PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - acr-config-only STANDARD_OUT 05:13:49 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - acr-config-only 05:13:49 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: acr 05:13:49 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: acr: 5a3ac86e-6133-49f9-9050-c17be42fdc61 05:13:49 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: acr: 5a3ac86e-6133-49f9-9050-c17be42fdc61 05:13:49 | DEBUG | ImageScanningTest | Kubernetes | acr-image-registry-test: secret created. 05:14:09 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 87f01c0f-9fae-47ce-8f65-1cd35cca0647 05:14:09 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:14:09 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace acr-config-only--acr-image-registry-test 05:14:09 | DEBUG | ImageScanningTest | Kubernetes | Waiting for acr-config-only--acr-image-registry-test to start 05:14:09 | DEBUG | ImageScanningTest | Kubernetes | Status of acr-config-only--acr-image-registry-test's pods: 05:14:09 | DEBUG | ImageScanningTest | Kubernetes | - acr-config-only--acr-image-registry-test-67d6d889d5-nnljh Container status: [] 05:14:09 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for acr-config-only--acr-image-registry-test 05:14:12 | DEBUG | ImageScanningTest | Kubernetes | Waiting for acr-config-only--acr-image-registry-test to start 05:14:12 | DEBUG | ImageScanningTest | Kubernetes | Status of acr-config-only--acr-image-registry-test's pods: 05:14:12 | DEBUG | ImageScanningTest | Kubernetes | - acr-config-only--acr-image-registry-test-67d6d889d5-nnljh Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:14:10Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:14:12 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for acr-config-only--acr-image-registry-test 05:14:12 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment acr-config-only--acr-image-registry-test 05:14:12 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment acr-config-only--acr-image-registry-test with 1 pods 05:14:12 | INFO | ImageScanningTest | Services | SR found deployment acr-config-only--acr-image-registry-test within 0s 05:14:25 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:25 | INFO | ImageScanningTest | Services | violation size is: 1 05:14:25 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:14:25 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:14:25 | INFO | ImageScanningTest | Services | violation size is: 1 05:14:25 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:14:25 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:14:30 | DEBUG | ImageScanningTest | Kubernetes | acr-image-registry-test: Secret removed. 05:14:30 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: acr-config-only--acr-image-registry-test 05:14:30 | DEBUG | ImageScanningTest | Kubernetes | acr-config-only--acr-image-registry-test: deployment removed. 05:14:30 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:14:51 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:stackroxci.azurecr.io/stackroxci/registry-image:0.3 05:14:51 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:stackroxci.azurecr.io/stackroxci/registry-image:0.3. 1 -v- 1 05:14:51 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 5a3ac86e-6133-49f9-9050-c17be42fdc61 05:14:51 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - acr-config-only PASSED ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - quay-auto STANDARD_OUT 05:14:51 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image metadata from registry test - quay-auto 05:14:51 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 0196e12b-2836-4dad-8c63-620a56a6a662 05:14:51 | DEBUG | ImageScanningTest | Kubernetes | quay-image-scanning-test: secret created. 05:15:11 | DEBUG | ImageScanningTest | OpenShift | Namespace qa-image-scanning-test already exists 05:15:11 | DEBUG | ImageScanningTest | Kubernetes | Told the orchestrator to createOrReplace quay-auto--quay-image-scanning-test 05:15:11 | DEBUG | ImageScanningTest | Kubernetes | Waiting for quay-auto--quay-image-scanning-test to start 05:15:11 | DEBUG | ImageScanningTest | Kubernetes | Status of quay-auto--quay-image-scanning-test's pods: 05:15:11 | DEBUG | ImageScanningTest | Kubernetes | - quay-auto--quay-image-scanning-test-7c4ccffcf4-sw596 Container status: [] 05:15:11 | DEBUG | ImageScanningTest | Kubernetes | 0/1 are in the ready state for quay-auto--quay-image-scanning-test 05:15:14 | DEBUG | ImageScanningTest | Kubernetes | Waiting for quay-auto--quay-image-scanning-test to start 05:15:14 | DEBUG | ImageScanningTest | Kubernetes | Status of quay-auto--quay-image-scanning-test's pods: 05:15:14 | DEBUG | ImageScanningTest | Kubernetes | - quay-auto--quay-image-scanning-test-7c4ccffcf4-sw596 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:15:11Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:15:14 | DEBUG | ImageScanningTest | Kubernetes | All 1 replicas found in ready state for quay-auto--quay-image-scanning-test 05:15:14 | DEBUG | ImageScanningTest | Kubernetes | Took 3 seconds for k8s deployment quay-auto--quay-image-scanning-test 05:15:14 | DEBUG | ImageScanningTest | Kubernetes | Updating deployment quay-auto--quay-image-scanning-test with 1 pods 05:15:14 | INFO | ImageScanningTest | Services | SR found deployment quay-auto--quay-image-scanning-test within 0s 05:15:27 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:27 | INFO | ImageScanningTest | Services | violation size is: 1 05:15:27 | INFO | ImageScanningTest | Services | ADD Command used instead of COPY (qa-image-scanning-test) triggered after waiting 0 seconds 05:15:27 | DEBUG | ImageScanningTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:15:27 | INFO | ImageScanningTest | Services | violation size is: 1 05:15:27 | INFO | ImageScanningTest | Services | Secure Shell (ssh) Port Exposed in Image (qa-image-scanning-test) triggered after waiting 0 seconds 05:15:27 | INFO | ImageScanningTest | BaseSpecification | Adding core image registry integration 05:15:27 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: core quay 05:15:28 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: core quay: e738a670-60e8-4029-a896-8dfab32b39af 05:15:28 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: core quay: e738a670-60e8-4029-a896-8dfab32b39af 05:15:28 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:15:33 | DEBUG | ImageScanningTest | Kubernetes | quay-image-scanning-test: Secret removed. 05:15:33 | DEBUG | ImageScanningTest | Kubernetes | Removed the deployment: quay-auto--quay-image-scanning-test 05:15:33 | DEBUG | ImageScanningTest | Kubernetes | quay-auto--quay-image-scanning-test: deployment removed. 05:15:33 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:15:53 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:registry-image-0-3 05:15:53 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa:registry-image-0-3. 1 -v- 1 05:15:53 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: be098b9c-4f91-4e80-b89e-1309a429164f 05:15:53 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image metadata from registry test - #testName > Image metadata from registry test - quay-auto PASSED ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null registry.k8s.io/ip-masq-agent-amd64:v2.4.1 from stackrox STANDARD_OUT 05:15:53 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image scanning test to check if scan time is not null registry.k8s.io/ip-masq-agent-amd64:v2.4.1 from stackrox 05:15:53 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:15:53 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 0f64ace5-8315-4938-b18d-2b816ef79152 05:15:53 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 0f64ace5-8315-4938-b18d-2b816ef79152 05:16:07 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:16:07 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:16:27 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:registry.k8s.io/ip-masq-agent-amd64:v2.4.1 05:16:27 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:registry.k8s.io/ip-masq-agent-amd64:v2.4.1. 1 -v- 1 05:16:27 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 0f64ace5-8315-4938-b18d-2b816ef79152 05:16:27 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null registry.k8s.io/ip-masq-agent-amd64:v2.4.1 from stackrox PASSED ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null quay.io/rhacs-eng/qa:alpine-3.16.0 from stackrox STANDARD_OUT 05:16:27 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image scanning test to check if scan time is not null quay.io/rhacs-eng/qa:alpine-3.16.0 from stackrox 05:16:27 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:16:27 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 870041c7-4dfe-4357-9df5-6b682161f2ce 05:16:27 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 870041c7-4dfe-4357-9df5-6b682161f2ce 05:16:42 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:16:42 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:17:03 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:alpine-3.16.0 05:17:03 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/rhacs-eng/qa:alpine-3.16.0. 1 -v- 1 05:17:03 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 870041c7-4dfe-4357-9df5-6b682161f2ce 05:17:03 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null quay.io/rhacs-eng/qa:alpine-3.16.0 from stackrox PASSED ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null quay.io/stackrox-io/scanner:2.27.3 from stackrox STANDARD_OUT 05:17:03 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image scanning test to check if scan time is not null quay.io/stackrox-io/scanner:2.27.3 from stackrox 05:17:03 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:17:03 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 65b084ce-b396-4e0a-a76b-0add7a6dedfa 05:17:03 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 65b084ce-b396-4e0a-a76b-0add7a6dedfa 05:17:21 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:17:21 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:17:41 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/stackrox-io/scanner:2.27.3 05:17:41 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:quay.io/stackrox-io/scanner:2.27.3. 1 -v- 1 05:17:41 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 65b084ce-b396-4e0a-a76b-0add7a6dedfa 05:17:41 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null quay.io/stackrox-io/scanner:2.27.3 from stackrox PASSED ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null gke.gcr.io/heapster:v1.7.2 from stackrox STANDARD_OUT 05:17:41 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image scanning test to check if scan time is not null gke.gcr.io/heapster:v1.7.2 from stackrox 05:17:41 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:17:41 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 8003aab7-8889-4c65-92f7-11116afa536b 05:17:41 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 8003aab7-8889-4c65-92f7-11116afa536b 05:17:56 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:17:56 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:18:16 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:gke.gcr.io/heapster:v1.7.2 05:18:16 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:gke.gcr.io/heapster:v1.7.2. 1 -v- 1 05:18:16 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 8003aab7-8889-4c65-92f7-11116afa536b 05:18:16 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null gke.gcr.io/heapster:v1.7.2 from stackrox PASSED ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null mcr.microsoft.com/dotnet/core/runtime:2.1-alpine from stackrox STANDARD_OUT 05:18:16 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Image scanning test to check if scan time is not null mcr.microsoft.com/dotnet/core/runtime:2.1-alpine from stackrox 05:18:16 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:18:16 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 9bd64f14-7456-4823-aebb-a85cb4bae359 05:18:16 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 9bd64f14-7456-4823-aebb-a85cb4bae359 05:18:31 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:18:31 | INFO | ImageScanningTest | ImageScanningTest | Sleeping to avoid race condition with reprocessing 05:18:51 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:mcr.microsoft.com/dotnet/core/runtime:2.1-alpine 05:18:51 | DEBUG | ImageScanningTest | ImageService | Deleted at least as many images as expected based on Image:mcr.microsoft.com/dotnet/core/runtime:2.1-alpine. 1 -v- 1 05:18:51 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 9bd64f14-7456-4823-aebb-a85cb4bae359 05:18:51 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Image scanning test to check if scan time is not null #image from stackrox > Image scanning test to check if scan time is not null mcr.microsoft.com/dotnet/core/runtime:2.1-alpine from stackrox PASSED ImageScanningTest > Validate basic image details across all current images in StackRox STANDARD_OUT 05:18:51 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Validate basic image details across all current images in StackRox 05:19:20 | INFO | ImageScanningTest | ImageScanningTest | [:] 05:19:20 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:19:20 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Validate basic image details across all current images in StackRox PASSED ImageScanningTest > Validate image deletion does not affect other images STANDARD_OUT 05:19:20 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Validate image deletion does not affect other images 05:19:20 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:19:20 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: 98616627-349d-4a7f-bd9c-ea2852d25fa8 05:19:20 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 98616627-349d-4a7f-bd9c-ea2852d25fa8 05:19:22 | DEBUG | ImageScanningTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa:centos7-base-echo 05:19:23 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:19:23 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Validate image deletion does not affect other images PASSED ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay registry with token STANDARD_OUT 05:19:23 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Quay registry and scanner supports token and/or robot credentials - quay registry with token 05:19:23 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: e738a670-60e8-4029-a896-8dfab32b39af 05:19:23 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:19:23 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: bf0bc1e4-b329-478b-bdd1-5e62192a80f5 05:19:23 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: bf0bc1e4-b329-478b-bdd1-5e62192a80f5 05:19:23 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: quay 05:19:23 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: quay: 20cc7dd3-ae28-41c1-9099-82ebdd0650aa 05:19:23 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: quay: 20cc7dd3-ae28-41c1-9099-82ebdd0650aa 05:19:32 | INFO | ImageScanningTest | BaseSpecification | Adding core image registry integration 05:19:32 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: core quay 05:19:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: core quay: f64447af-cb9c-4f68-9f31-b872e8b56a50 05:19:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: core quay: f64447af-cb9c-4f68-9f31-b872e8b56a50 05:19:33 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:19:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 20cc7dd3-ae28-41c1-9099-82ebdd0650aa 05:19:33 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay registry with token PASSED ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay with robot creds only STANDARD_OUT 05:19:33 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Quay registry and scanner supports token and/or robot credentials - quay with robot creds only 05:19:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: f64447af-cb9c-4f68-9f31-b872e8b56a50 05:19:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:19:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: ef8c4c0d-8798-491c-9445-be181d2abd3f 05:19:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: ef8c4c0d-8798-491c-9445-be181d2abd3f 05:19:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: quay 05:19:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: quay: ef742374-c7f2-49de-a2db-08e3b4064a52 05:19:33 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: quay: ef742374-c7f2-49de-a2db-08e3b4064a52 05:19:34 | INFO | ImageScanningTest | BaseSpecification | Adding core image registry integration 05:19:34 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: core quay 05:19:34 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: core quay: 0bcc4fe9-5214-4f99-883b-623df9cab2bb 05:19:34 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: core quay: 0bcc4fe9-5214-4f99-883b-623df9cab2bb 05:19:34 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:19:34 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: ef742374-c7f2-49de-a2db-08e3b4064a52 05:19:34 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay with robot creds only PASSED ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay registry+scanner with token STANDARD_OUT 05:19:34 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Quay registry and scanner supports token and/or robot credentials - quay registry+scanner with token 05:19:34 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 0bcc4fe9-5214-4f99-883b-623df9cab2bb 05:19:35 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: quay 05:19:36 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: quay: 79a310d4-3233-479a-b7a3-c7d4eba6106c 05:19:36 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: quay: 79a310d4-3233-479a-b7a3-c7d4eba6106c 05:19:38 | INFO | ImageScanningTest | BaseSpecification | Adding core image registry integration 05:19:38 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: core quay 05:19:38 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: core quay: cda61b10-6fc3-4ba0-bc9f-7b4c8e099c01 05:19:38 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: core quay: cda61b10-6fc3-4ba0-bc9f-7b4c8e099c01 05:19:38 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:19:38 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: 79a310d4-3233-479a-b7a3-c7d4eba6106c 05:19:38 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay registry+scanner with token PASSED ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay registry+scanner with token and robot creds STANDARD_OUT 05:19:38 | INFO | ImageScanningTest | ImageScanningTest | Starting testcase: Quay registry and scanner supports token and/or robot credentials - quay registry+scanner with token and robot creds 05:19:38 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: cda61b10-6fc3-4ba0-bc9f-7b4c8e099c01 05:19:39 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: quay 05:19:39 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: quay: e2873b2b-0410-4811-a2b4-1e1860bfb403 05:19:39 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: quay: e2873b2b-0410-4811-a2b4-1e1860bfb403 05:19:40 | INFO | ImageScanningTest | BaseSpecification | Adding core image registry integration 05:19:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: core quay 05:19:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: core quay: c5e05c9d-3f61-44c9-bd9f-a9d862686bcd 05:19:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: core quay: c5e05c9d-3f61-44c9-bd9f-a9d862686bcd 05:19:40 | INFO | ImageScanningTest | ImageScanningTest | Post test cleanup: 05:19:40 | DEBUG | ImageScanningTest | ImageIntegrationService | Image integration deleted: e2873b2b-0410-4811-a2b4-1e1860bfb403 05:19:40 | INFO | ImageScanningTest | ImageScanningTest | Ending testcase ImageScanningTest > Quay registry and scanner supports token and/or robot credentials - #testName > Quay registry and scanner supports token and/or robot credentials - quay registry+scanner with token and robot creds PASSED ImageScanningTest STANDARD_OUT 05:19:41 | DEBUG | ImageScanningTest | Kubernetes | Waiting for namespace qa-image-scanning-test to be deleted 05:19:41 | DEBUG | ImageScanningTest | Kubernetes | Retrying in 3... 05:19:44 | DEBUG | ImageScanningTest | Kubernetes | Retrying in 3... 05:19:47 | DEBUG | ImageScanningTest | Kubernetes | Retrying in 3... 05:19:50 | DEBUG | ImageScanningTest | Kubernetes | K8s found that namespace qa-image-scanning-test was deleted 05:19:50 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:19:50 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration created: Stackrox Scanner: ebbf2ea9-f4c5-4160-b0ab-9079011a0722 05:19:50 | DEBUG | ImageScanningTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: ebbf2ea9-f4c5-4160-b0ab-9079011a0722 05:19:50 | DEBUG | ImageScanningTest | Kubernetes | gcr-image-pull-secret: secret created. 05:19:50 | INFO | ImageScanningTest | ImageScanningTest | Ending testsuite 05:19:50 | INFO | ImageScanningTest | ImageScanningTest | Checking if cluster is healthy after test 05:19:50 | DEBUG | ImageScanningTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ImageSignatureVerificationTest STANDARD_OUT 05:19:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testsuite 05:19:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | quay: secret created. 05:19:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | public-dockerhub: secret created. 05:19:50 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Distroless: io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677 05:19:50 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Tekton: io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c 05:19:50 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Unverifiable: io.stackrox.signatureintegration.9c727539-9b8d-48ae-baf7-38dfa8176f64 05:19:50 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Same+Digest: io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf 05:19:50 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: BYOPKI-Wildcard: io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3 05:19:50 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: BYOPKI-Matching: io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043 05:19:50 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: BYOPKI-Unverifiable: io.stackrox.signatureintegration.a1a02c50-16da-4751-a194-46282d7bcc69 05:19:50 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Distroless+Tekton: io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 05:19:50 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: BOYPKI-Wildcard+Tekton: io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da 05:19:51 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Keyless-Sigstore-Matching: io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1 05:19:51 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Keyless-Sigstore-Unverifiable: io.stackrox.signatureintegration.84484e24-48f0-459e-b25a-a80d06145c5f 05:19:51 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Keyless-RHTAS-Matching: io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644 05:19:51 | DEBUG | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration created: Keyless-RHTAS-Unverifiable: io.stackrox.signatureintegration.2e7304ec-6720-48fe-ab74-5b2e4e3bd06d 05:19:51 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:19:51 | DEBUG | ImageSignatureVerificatio | OpenShift | Adding system:serviceaccount:qa-signature-tests:default to anyuid user list 05:19:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace with-signature-verified-by-distroless 05:19:51 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:19:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace with-signature-verified-by-tekton 05:19:51 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:19:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace with-signature-unverifiable 05:19:51 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:19:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace without-signature 05:19:51 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:19:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace same-digest-without-signature 05:19:51 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:19:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace same-digest-with-signature 05:19:51 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:19:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace byopki 05:19:51 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:19:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace keyless-sigstore 05:19:51 | DEBUG | ImageSignatureVerificatio | OpenShift | Namespace qa-signature-tests already exists 05:19:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Told the orchestrator to createOrReplace keyless-rhtas 05:19:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for with-signature-verified-by-distroless to start 05:19:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of with-signature-verified-by-distroless's pods: 05:19:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | - with-signature-verified-by-distroless-cdc7974cb-gj4ll Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:19:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | 0/1 are in the ready state for with-signature-verified-by-distroless 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for with-signature-verified-by-distroless to start 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of with-signature-verified-by-distroless's pods: 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | - with-signature-verified-by-distroless-cdc7974cb-gj4ll Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:19:52Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for with-signature-verified-by-distroless 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 3 seconds for k8s deployment with-signature-verified-by-distroless 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment with-signature-verified-by-distroless with 1 pods 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for with-signature-verified-by-tekton to start 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of with-signature-verified-by-tekton's pods: 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | - with-signature-verified-by-tekton-cd6f9fdfc-8mf6v Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:19:52Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for with-signature-verified-by-tekton 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment with-signature-verified-by-tekton 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment with-signature-verified-by-tekton with 1 pods 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for with-signature-unverifiable to start 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of with-signature-unverifiable's pods: 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | - with-signature-unverifiable-5969d7d8c9-krgfb Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:19:52Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for with-signature-unverifiable 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment with-signature-unverifiable 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment with-signature-unverifiable with 1 pods 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for without-signature to start 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of without-signature's pods: 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | - without-signature-5d6fd9ddb7-vdhcx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:19:52Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for without-signature 05:19:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment without-signature 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment without-signature with 1 pods 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for same-digest-without-signature to start 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of same-digest-without-signature's pods: 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | - same-digest-without-signature-5654f489f6-vj86d Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:19:52Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for same-digest-without-signature 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment same-digest-without-signature 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment same-digest-without-signature with 1 pods 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for same-digest-with-signature to start 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of same-digest-with-signature's pods: 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | - same-digest-with-signature-5d5548ff99-2k7w9 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:19:52Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for same-digest-with-signature 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment same-digest-with-signature 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment same-digest-with-signature with 1 pods 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for byopki to start 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of byopki's pods: 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | - byopki-5bb68c6b96-s7dvr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:19:52Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for byopki 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment byopki 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment byopki with 1 pods 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for keyless-sigstore to start 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of keyless-sigstore's pods: 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | - keyless-sigstore-7fb9ffcd6f-w5j4z Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:19:52Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for keyless-sigstore 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment keyless-sigstore 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment keyless-sigstore with 1 pods 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for keyless-rhtas to start 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Status of keyless-rhtas's pods: 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | - keyless-rhtas-6b7975bc87-pmntb Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:19:52Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | All 1 replicas found in ready state for keyless-rhtas 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Took 0 seconds for k8s deployment keyless-rhtas 05:19:55 | DEBUG | ImageSignatureVerificatio | Kubernetes | Updating deployment keyless-rhtas with 1 pods 05:19:55 | INFO | ImageSignatureVerificatio | Services | SR found deployment with-signature-verified-by-distroless within 0s 05:19:55 | INFO | ImageSignatureVerificatio | Services | SR found deployment with-signature-verified-by-tekton within 0s 05:19:55 | INFO | ImageSignatureVerificatio | Services | SR found deployment with-signature-unverifiable within 0s 05:19:55 | INFO | ImageSignatureVerificatio | Services | SR found deployment without-signature within 0s 05:19:55 | INFO | ImageSignatureVerificatio | Services | SR found deployment same-digest-without-signature within 0s 05:19:55 | INFO | ImageSignatureVerificatio | Services | SR found deployment same-digest-with-signature within 0s 05:19:55 | INFO | ImageSignatureVerificatio | Services | SR found deployment byopki within 0s 05:19:55 | INFO | ImageSignatureVerificatio | Services | SR found deployment keyless-sigstore within 0s 05:19:55 | INFO | ImageSignatureVerificatio | Services | SR found deployment keyless-rhtas within 0s 05:19:55 | DEBUG | ImageSignatureVerificatio | Helpers | Caught exception. Retrying in 30s (attempt 0 of 20): io.grpc.StatusRuntimeException: NOT_FOUND: image with id "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6" does not exist: not found ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'byopki' STANDARD_OUT 05:20:28 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'byopki' 05:20:28 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:28 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:20:28 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:20:28 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:20:28 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'with-signature-verified-by-distroless' 05:20:28 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:28 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless - additional 2 consecutive checks required 05:20:31 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:31 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless - additional 1 consecutive checks required 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless after waiting 6 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'keyless-rhtas' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'keyless-rhtas' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:20:34 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'keyless-sigstore' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'keyless-sigstore' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:20:34 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'same-digest-without-signature' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'same-digest-without-signature' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:20:34 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'same-digest-with-signature' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'same-digest-with-signature' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:20:34 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'with-signature-verified-by-tekton' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:34 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'with-signature-unverifiable' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:20:34 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'without-signature' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless' for deployment 'without-signature' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | violation size is: 3 05:20:34 | INFO | ImageSignatureVerificatio | Services | Distroless triggered after waiting 0 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'byopki' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'byopki' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:34 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'with-signature-verified-by-distroless' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:34 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'keyless-rhtas' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'keyless-rhtas' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:34 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'keyless-sigstore' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'keyless-sigstore' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:34 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'same-digest-without-signature' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'same-digest-without-signature' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:34 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'same-digest-with-signature' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'same-digest-with-signature' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:34 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:20:34 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'with-signature-verified-by-tekton' 05:20:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:34 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Tekton - additional 2 consecutive checks required 05:20:37 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:37 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Tekton - additional 1 consecutive checks required 05:20:40 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:40 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Tekton after waiting 6 seconds 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'with-signature-unverifiable' 05:20:40 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:40 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:40 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'without-signature' STANDARD_OUT 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Tekton' for deployment 'without-signature' 05:20:40 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:40 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:40 | INFO | ImageSignatureVerificatio | Services | Tekton triggered after waiting 0 seconds 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Tekton' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'byopki' STANDARD_OUT 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'byopki' 05:20:40 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:40 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:40 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'with-signature-verified-by-distroless' 05:20:40 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:40 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:40 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'keyless-rhtas' STANDARD_OUT 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'keyless-rhtas' 05:20:40 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:40 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:40 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'keyless-sigstore' STANDARD_OUT 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'keyless-sigstore' 05:20:40 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:40 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:40 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'same-digest-without-signature' STANDARD_OUT 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'same-digest-without-signature' 05:20:40 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:40 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:40 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'same-digest-with-signature' STANDARD_OUT 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'same-digest-with-signature' 05:20:40 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:40 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:40 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:20:40 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'with-signature-verified-by-tekton' 05:20:40 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:41 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:41 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:20:41 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:20:41 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'with-signature-unverifiable' 05:20:41 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:41 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:41 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:20:41 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'without-signature' STANDARD_OUT 05:20:41 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Unverifiable' for deployment 'without-signature' 05:20:41 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:41 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:41 | INFO | ImageSignatureVerificatio | Services | Unverifiable triggered after waiting 0 seconds 05:20:41 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Unverifiable' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'byopki' STANDARD_OUT 05:20:41 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'byopki' 05:20:41 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:41 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:20:41 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:20:41 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:20:41 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-verified-by-distroless' 05:20:41 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:41 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless+Tekton - additional 2 consecutive checks required 05:20:44 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:44 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless+Tekton - additional 1 consecutive checks required 05:20:47 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:47 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless+Tekton after waiting 6 seconds 05:20:47 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'keyless-rhtas' STANDARD_OUT 05:20:47 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'keyless-rhtas' 05:20:47 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:47 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:20:47 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:20:47 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'keyless-sigstore' STANDARD_OUT 05:20:47 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'keyless-sigstore' 05:20:47 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:47 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:20:47 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:20:47 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'same-digest-without-signature' STANDARD_OUT 05:20:47 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'same-digest-without-signature' 05:20:47 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:47 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:20:47 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:20:47 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'same-digest-with-signature' STANDARD_OUT 05:20:47 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'same-digest-with-signature' 05:20:47 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:47 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:20:47 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:20:47 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:20:47 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-verified-by-tekton' 05:20:47 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:47 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Distroless+Tekton - additional 2 consecutive checks required 05:20:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:50 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Distroless+Tekton - additional 1 consecutive checks required 05:20:53 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:53 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Distroless+Tekton after waiting 6 seconds 05:20:53 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:20:53 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-unverifiable' 05:20:53 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:53 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:20:53 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:20:53 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'without-signature' STANDARD_OUT 05:20:53 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton' for deployment 'without-signature' 05:20:53 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:53 | INFO | ImageSignatureVerificatio | Services | violation size is: 2 05:20:53 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton triggered after waiting 0 seconds 05:20:53 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'byopki' STANDARD_OUT 05:20:53 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'byopki' 05:20:53 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:53 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:53 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:20:53 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:20:53 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-verified-by-distroless' 05:20:53 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:53 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless+Tekton+Unverifiable - additional 2 consecutive checks required 05:20:56 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:56 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless+Tekton+Unverifiable - additional 1 consecutive checks required 05:20:59 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:59 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-distroless and policy Distroless+Tekton+Unverifiable after waiting 6 seconds 05:20:59 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'keyless-rhtas' STANDARD_OUT 05:20:59 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'keyless-rhtas' 05:20:59 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:59 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:59 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:20:59 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'keyless-sigstore' STANDARD_OUT 05:20:59 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'keyless-sigstore' 05:20:59 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:59 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:59 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:20:59 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'same-digest-without-signature' STANDARD_OUT 05:20:59 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'same-digest-without-signature' 05:20:59 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:59 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:59 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:20:59 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'same-digest-with-signature' STANDARD_OUT 05:20:59 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'same-digest-with-signature' 05:20:59 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:59 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:20:59 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:20:59 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:20:59 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-verified-by-tekton' 05:20:59 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:20:59 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Distroless+Tekton+Unverifiable - additional 2 consecutive checks required 05:21:02 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:02 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Distroless+Tekton+Unverifiable - additional 1 consecutive checks required 05:21:05 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:05 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy Distroless+Tekton+Unverifiable after waiting 6 seconds 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-unverifiable' 05:21:05 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:05 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:05 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'without-signature' STANDARD_OUT 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'without-signature' 05:21:05 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:05 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:05 | INFO | ImageSignatureVerificatio | Services | Distroless+Tekton+Unverifiable triggered after waiting 0 seconds 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Distroless+Tekton+Unverifiable' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'byopki' STANDARD_OUT 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'byopki' 05:21:05 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:05 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:05 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'with-signature-verified-by-distroless' 05:21:05 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:05 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:05 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'keyless-rhtas' STANDARD_OUT 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'keyless-rhtas' 05:21:05 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:05 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:05 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'keyless-sigstore' STANDARD_OUT 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'keyless-sigstore' 05:21:05 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:05 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:05 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'same-digest-without-signature' STANDARD_OUT 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'same-digest-without-signature' 05:21:05 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:05 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:05 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'same-digest-with-signature' STANDARD_OUT 05:21:05 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'same-digest-with-signature' 05:21:05 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:06 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment same-digest-with-signature and policy Same+Digest - additional 2 consecutive checks required 05:21:09 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:09 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment same-digest-with-signature and policy Same+Digest - additional 1 consecutive checks required 05:21:12 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:12 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment same-digest-with-signature and policy Same+Digest after waiting 6 seconds 05:21:12 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:21:12 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'with-signature-verified-by-tekton' 05:21:12 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:12 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:12 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:21:12 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:21:12 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'with-signature-unverifiable' 05:21:12 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:12 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:12 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:21:12 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'without-signature' STANDARD_OUT 05:21:12 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Same+Digest' for deployment 'without-signature' 05:21:12 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:12 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:12 | INFO | ImageSignatureVerificatio | Services | Same+Digest triggered after waiting 0 seconds 05:21:12 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Same+Digest' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'byopki' STANDARD_OUT 05:21:12 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'byopki' 05:21:12 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:12 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BYOPKI-Wildcard - additional 2 consecutive checks required 05:21:15 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:15 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BYOPKI-Wildcard - additional 1 consecutive checks required 05:21:18 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:18 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BYOPKI-Wildcard after waiting 6 seconds 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-verified-by-distroless' 05:21:18 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:18 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:18 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'keyless-rhtas' STANDARD_OUT 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'keyless-rhtas' 05:21:18 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:18 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:18 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'keyless-sigstore' STANDARD_OUT 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'keyless-sigstore' 05:21:18 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:18 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:18 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'same-digest-without-signature' STANDARD_OUT 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'same-digest-without-signature' 05:21:18 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:18 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:18 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'same-digest-with-signature' STANDARD_OUT 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'same-digest-with-signature' 05:21:18 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:18 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:18 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-verified-by-tekton' 05:21:18 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:18 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:18 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-unverifiable' 05:21:18 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:18 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:18 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'without-signature' STANDARD_OUT 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Wildcard' for deployment 'without-signature' 05:21:18 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:18 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:18 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Wildcard triggered after waiting 0 seconds 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Wildcard' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'byopki' STANDARD_OUT 05:21:18 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'byopki' 05:21:18 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:18 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BYOPKI-Matching - additional 2 consecutive checks required 05:21:21 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:21 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BYOPKI-Matching - additional 1 consecutive checks required 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BYOPKI-Matching after waiting 6 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-verified-by-distroless' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:24 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'keyless-rhtas' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'keyless-rhtas' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:24 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'keyless-sigstore' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'keyless-sigstore' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:24 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'same-digest-without-signature' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'same-digest-without-signature' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:24 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'same-digest-with-signature' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'same-digest-with-signature' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:24 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-verified-by-tekton' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:24 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-unverifiable' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:24 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'without-signature' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Matching' for deployment 'without-signature' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:24 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Matching triggered after waiting 0 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Matching' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'byopki' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'byopki' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:24 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-verified-by-distroless' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:24 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'keyless-rhtas' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'keyless-rhtas' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:24 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'keyless-sigstore' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'keyless-sigstore' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:24 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'same-digest-without-signature' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'same-digest-without-signature' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:24 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:24 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'same-digest-with-signature' STANDARD_OUT 05:21:24 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'same-digest-with-signature' 05:21:24 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:25 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:25 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:21:25 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:21:25 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-verified-by-tekton' 05:21:25 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:25 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:25 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:21:25 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:21:25 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-unverifiable' 05:21:25 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:25 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:25 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:21:25 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'without-signature' STANDARD_OUT 05:21:25 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BYOPKI-Unverifiable' for deployment 'without-signature' 05:21:25 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:25 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:25 | INFO | ImageSignatureVerificatio | Services | BYOPKI-Unverifiable triggered after waiting 0 seconds 05:21:25 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BYOPKI-Unverifiable' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'byopki' STANDARD_OUT 05:21:25 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'byopki' 05:21:25 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:25 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BOYPKI-Wildcard+Tekton - additional 2 consecutive checks required 05:21:28 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:28 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BOYPKI-Wildcard+Tekton - additional 1 consecutive checks required 05:21:31 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:31 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment byopki and policy BOYPKI-Wildcard+Tekton after waiting 6 seconds 05:21:31 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:21:31 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-verified-by-distroless' 05:21:31 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:31 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:31 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:21:31 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'keyless-rhtas' STANDARD_OUT 05:21:31 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'keyless-rhtas' 05:21:31 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:31 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:31 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:21:31 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'keyless-sigstore' STANDARD_OUT 05:21:31 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'keyless-sigstore' 05:21:31 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:31 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:31 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:21:31 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'same-digest-without-signature' STANDARD_OUT 05:21:31 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'same-digest-without-signature' 05:21:31 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:31 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:31 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:21:31 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'same-digest-with-signature' STANDARD_OUT 05:21:31 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'same-digest-with-signature' 05:21:31 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:31 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:31 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:21:31 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:21:31 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-verified-by-tekton' 05:21:31 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:31 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy BOYPKI-Wildcard+Tekton - additional 2 consecutive checks required 05:21:34 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:34 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy BOYPKI-Wildcard+Tekton - additional 1 consecutive checks required 05:21:37 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:37 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment with-signature-verified-by-tekton and policy BOYPKI-Wildcard+Tekton after waiting 6 seconds 05:21:37 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:21:37 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-unverifiable' 05:21:37 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:37 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:37 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:21:37 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'without-signature' STANDARD_OUT 05:21:37 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'without-signature' 05:21:37 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:37 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:37 | INFO | ImageSignatureVerificatio | Services | BOYPKI-Wildcard+Tekton triggered after waiting 0 seconds 05:21:37 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'BOYPKI-Wildcard+Tekton' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'byopki' STANDARD_OUT 05:21:37 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'byopki' 05:21:37 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:37 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:37 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:21:37 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:21:37 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-verified-by-distroless' 05:21:37 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:37 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:37 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:21:37 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'keyless-rhtas' STANDARD_OUT 05:21:37 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'keyless-rhtas' 05:21:37 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:37 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:37 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:21:37 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'keyless-sigstore' STANDARD_OUT 05:21:37 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'keyless-sigstore' 05:21:37 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:37 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment keyless-sigstore and policy Keyless-Sigstore-Matching - additional 2 consecutive checks required 05:21:40 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:40 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment keyless-sigstore and policy Keyless-Sigstore-Matching - additional 1 consecutive checks required 05:21:43 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:43 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment keyless-sigstore and policy Keyless-Sigstore-Matching after waiting 6 seconds 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'same-digest-without-signature' STANDARD_OUT 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'same-digest-without-signature' 05:21:43 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:43 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:43 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'same-digest-with-signature' STANDARD_OUT 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'same-digest-with-signature' 05:21:43 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:43 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:43 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-verified-by-tekton' 05:21:43 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:43 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:43 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-unverifiable' 05:21:43 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:43 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:43 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'without-signature' STANDARD_OUT 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'without-signature' 05:21:43 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:43 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:43 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Matching triggered after waiting 0 seconds 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Matching' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'byopki' STANDARD_OUT 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'byopki' 05:21:43 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:43 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:43 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-verified-by-distroless' 05:21:43 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:43 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:43 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'keyless-rhtas' STANDARD_OUT 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'keyless-rhtas' 05:21:43 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:43 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:43 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'keyless-sigstore' STANDARD_OUT 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'keyless-sigstore' 05:21:43 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:43 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:43 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'same-digest-without-signature' STANDARD_OUT 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'same-digest-without-signature' 05:21:43 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:43 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:43 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'same-digest-with-signature' STANDARD_OUT 05:21:43 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'same-digest-with-signature' 05:21:44 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:44 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:44 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:21:44 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:21:44 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-verified-by-tekton' 05:21:44 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:44 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:44 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:21:44 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:21:44 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-unverifiable' 05:21:44 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:44 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:44 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:21:44 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'without-signature' STANDARD_OUT 05:21:44 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'without-signature' 05:21:44 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:44 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:44 | INFO | ImageSignatureVerificatio | Services | Keyless-Sigstore-Unverifiable triggered after waiting 0 seconds 05:21:44 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-Sigstore-Unverifiable' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'byopki' STANDARD_OUT 05:21:44 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'byopki' 05:21:44 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:44 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:44 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:21:44 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:21:44 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-verified-by-distroless' 05:21:44 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:44 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:44 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:21:44 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'keyless-rhtas' STANDARD_OUT 05:21:44 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'keyless-rhtas' 05:21:44 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:44 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment keyless-rhtas and policy Keyless-RHTAS-Matching - additional 2 consecutive checks required 05:21:47 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:47 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment keyless-rhtas and policy Keyless-RHTAS-Matching - additional 1 consecutive checks required 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | No active violations found for deployment keyless-rhtas and policy Keyless-RHTAS-Matching after waiting 6 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'keyless-sigstore' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'keyless-sigstore' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'same-digest-without-signature' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'same-digest-without-signature' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'same-digest-with-signature' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'same-digest-with-signature' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-verified-by-tekton' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-unverifiable' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'without-signature' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'without-signature' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Matching triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Matching' for deployment 'without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'byopki' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'byopki' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'byopki' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-verified-by-distroless' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-verified-by-distroless' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-verified-by-distroless' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'keyless-rhtas' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'keyless-rhtas' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'keyless-rhtas' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'keyless-sigstore' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'keyless-sigstore' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'keyless-sigstore' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'same-digest-without-signature' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'same-digest-without-signature' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'same-digest-without-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'same-digest-with-signature' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'same-digest-with-signature' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'same-digest-with-signature' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-verified-by-tekton' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-verified-by-tekton' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-verified-by-tekton' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-unverifiable' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-unverifiable' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'with-signature-unverifiable' PASSED ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'without-signature' STANDARD_OUT 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Starting testcase: Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'without-signature' 05:21:50 | DEBUG | ImageSignatureVerificatio | Helpers | Calling services.AlertService.getViolations with 3 retries 05:21:50 | INFO | ImageSignatureVerificatio | Services | violation size is: 1 05:21:50 | INFO | ImageSignatureVerificatio | Services | Keyless-RHTAS-Unverifiable triggered after waiting 0 seconds 05:21:50 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testcase ImageSignatureVerificationTest > Check violations of policy '#policyName' for deployment '#deployment.name' > Check violations of policy 'Keyless-RHTAS-Unverifiable' for deployment 'without-signature' PASSED ImageSignatureVerificationTest STANDARD_OUT 05:21:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: with-signature-verified-by-distroless 05:21:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | with-signature-verified-by-distroless: deployment removed. 05:21:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: with-signature-verified-by-tekton 05:21:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | with-signature-verified-by-tekton: deployment removed. 05:21:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: with-signature-unverifiable 05:21:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | with-signature-unverifiable: deployment removed. 05:21:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: without-signature 05:21:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | without-signature: deployment removed. 05:21:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: same-digest-without-signature 05:21:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | same-digest-without-signature: deployment removed. 05:21:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: same-digest-with-signature 05:21:50 | DEBUG | ImageSignatureVerificatio | Kubernetes | same-digest-with-signature: deployment removed. 05:21:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: byopki 05:21:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | byopki: deployment removed. 05:21:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: keyless-sigstore 05:21:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | keyless-sigstore: deployment removed. 05:21:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | Removed the deployment: keyless-rhtas 05:21:51 | DEBUG | ImageSignatureVerificatio | Kubernetes | keyless-rhtas: deployment removed. 05:21:52 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677 05:21:52 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c 05:21:52 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.9c727539-9b8d-48ae-baf7-38dfa8176f64 05:21:53 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf 05:21:53 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3 05:21:53 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043 05:21:53 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.a1a02c50-16da-4751-a194-46282d7bcc69 05:21:53 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 05:21:53 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da 05:21:53 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1 05:21:53 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.84484e24-48f0-459e-b25a-a80d06145c5f 05:21:53 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644 05:21:54 | INFO | ImageSignatureVerificatio | SignatureIntegrationServi | Signature integration deleted: io.stackrox.signatureintegration.2e7304ec-6720-48fe-ab74-5b2e4e3bd06d 05:21:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for namespace qa-signature-tests to be deleted 05:21:54 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:21:57 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:00 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:03 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:06 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:09 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:12 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:15 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:18 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:21 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:24 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:27 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:30 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:33 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:36 | DEBUG | ImageSignatureVerificatio | Kubernetes | Retrying in 3... 05:22:39 | DEBUG | ImageSignatureVerificatio | Kubernetes | K8s found that namespace qa-signature-tests was deleted 05:22:39 | DEBUG | ImageSignatureVerificatio | Kubernetes | Waiting for namespace qa-signature-tests to be deleted 05:22:39 | DEBUG | ImageSignatureVerificatio | Kubernetes | K8s found that namespace qa-signature-tests was deleted 05:22:39 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Ending testsuite 05:22:39 | INFO | ImageSignatureVerificatio | ImageSignatureVerificatio | Checking if cluster is healthy after test 05:22:39 | DEBUG | ImageSignatureVerificatio | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries IntegrationHealthTest STANDARD_OUT 05:22:39 | INFO | IntegrationHealthTest | IntegrationHealthTest | Starting testsuite IntegrationHealthTest > Verify vulnerability definitions information is available STANDARD_OUT 05:22:39 | INFO | IntegrationHealthTest | IntegrationHealthTest | Starting testcase: Verify vulnerability definitions information is available 05:22:39 | INFO | IntegrationHealthTest | IntegrationHealthTest | Ending testcase IntegrationHealthTest > Verify vulnerability definitions information is available PASSED IntegrationHealthTest STANDARD_OUT 05:22:39 | INFO | IntegrationHealthTest | IntegrationHealthTest | Ending testsuite 05:22:39 | INFO | IntegrationHealthTest | IntegrationHealthTest | Checking if cluster is healthy after test 05:22:39 | DEBUG | IntegrationHealthTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries IntegrationsSplunkViolationsTest STANDARD_OUT 05:22:39 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Starting testsuite 05:22:39 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Waiting for namespace qa-splunk to be deleted 05:22:39 | DEBUG | IntegrationsSplunkViolati | Kubernetes | K8s found that namespace qa-splunk was deleted 05:22:39 | INFO | IntegrationsSplunkViolati | OpenShift | Created namespace qa-splunk 05:22:39 | INFO | IntegrationsSplunkViolati | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-splunk namespace. 05:22:39 | DEBUG | IntegrationsSplunkViolati | Kubernetes | quay: secret created. 05:22:39 | DEBUG | IntegrationsSplunkViolati | Kubernetes | default-dockercfg-tkj7v: secret created. 05:22:39 | DEBUG | IntegrationsSplunkViolati | Kubernetes | redhat-image-pull-secret: secret created. 05:22:39 | DEBUG | IntegrationsSplunkViolati | Kubernetes | public-dockerhub: secret created. 05:22:39 | DEBUG | IntegrationsSplunkViolati | Kubernetes | gcr-image-pull-secret: secret created. 05:22:40 | DEBUG | IntegrationsSplunkViolati | OpenShift | Adding system:serviceaccount:qa-splunk:default to anyuid user list 05:22:40 | DEBUG | IntegrationsSplunkViolati | Kubernetes | quay: secret created. 05:22:40 | DEBUG | IntegrationsSplunkViolati | Kubernetes | public-dockerhub: secret created. IntegrationsSplunkViolationsTest > Verify Splunk violations: StackRox violations reach Splunk TA STANDARD_OUT 05:22:40 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Starting testcase: Verify Splunk violations: StackRox violations reach Splunk TA 05:22:40 | DEBUG | IntegrationsSplunkViolati | OpenShift | Namespace qa-splunk already exists 05:22:40 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Told the orchestrator to createOrReplace splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 05:22:40 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Waiting for splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 to start 05:22:40 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Status of splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9's pods: 05:22:40 | DEBUG | IntegrationsSplunkViolati | Kubernetes | 0/1 are in the ready state for splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 05:22:43 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Waiting for splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 to start 05:22:43 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Status of splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9's pods: 05:22:43 | DEBUG | IntegrationsSplunkViolati | Kubernetes | - splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:22:41Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:22:43 | DEBUG | IntegrationsSplunkViolati | Kubernetes | All 1 replicas found in ready state for splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 05:22:43 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Took 3 seconds for k8s deployment splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 05:22:43 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Updating deployment splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 with 1 pods 05:22:43 | DEBUG | IntegrationsSplunkViolati | Kubernetes | splunk-collector-30b0ad59-2cd5-40b1-8620-213024e4cea9: Service created 05:22:43 | DEBUG | IntegrationsSplunkViolati | Kubernetes | splunk-syslog-30b0ad59-2cd5-40b1-8620-213024e4cea9: Service created 05:22:43 | INFO | IntegrationsSplunkViolati | SplunkUtil | Waiting for Splunk to boot... 05:22:43 | DEBUG | IntegrationsSplunkViolati | Helpers | Caught exception. Retrying in 10s (attempt 0 of 30): javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake 05:22:53 | DEBUG | IntegrationsSplunkViolati | Helpers | Caught exception. Retrying in 10s (attempt 1 of 30): javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake 05:23:03 | DEBUG | IntegrationsSplunkViolati | Helpers | Caught exception. Retrying in 10s (attempt 2 of 30): javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake 05:23:14 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | Splunkd status: {"links":{},"origin":"https://127.0.0.1:40727/services/server/health","updated":"2025-11-27T05:23:14+00:00","generator":{"build":"e9494146ae5c","version":"9.0.5"},"entry":[{"name":"splunkd","id":"https://127.0.0.1:40727/services/server/health/splunkd","updated":"1970-01-01T00:00:00+00:00","links":{"alternate":"/services/server/health/splunkd","list":"/services/server/health/splunkd"},"author":"system","acl":{"app":"","can_list":true,"can_write":true,"modifiable":false,"owner":"system","perms":{"read":["admin","splunk-system-role"],"write":[]},"removable":false,"sharing":"system"},"content":{"eai:acl":null,"features":{"File Monitor Input":{"features":{"Forwarder Ingestion Latency":{"health":"green"},"Ingestion Latency":{"health":"green"},"Large and Archive File Reader-0":{"health":"green"},"Real-time Reader-0":{"health":"green"}},"health":"green"},"Index Processor":{"features":{"Buckets":{"health":"green"},"Disk Space":{"health":"green"},"Index Optimization":{"health":"green"}},"health":"green"},"Search Scheduler":{"features":{"Scheduler Suppression":{"health":"green"},"Search Lag":{"health":"green"},"Searches Delayed":{"health":"green"},"Searches Skipped in the last 24 hours":{"health":"green"}},"health":"green"},"Workload Management":{"disabled":true,"health":"green"}},"health":"green"}}],"paging":{"total":1,"perPage":30,"offset":0},"messages":[]} 05:23:14 | INFO | IntegrationsSplunkViolati | SplunkUtil | Splunk has completed booting 05:23:14 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Starting Splunk TA configuration 05:23:14 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Copying TA and CIM app files to splunk pod 05:23:15 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Installing TA 05:23:17 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Installing CIM app 05:23:18 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6 is running 05:23:18 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6: [sudo, /opt/splunk/bin/splunk, set, minfreemb, 200, -auth, admin:helloworld] 05:23:19 | DEBUG | | Kubernetes | Command exited with 0 05:23:19 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:23:19 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: SUCCESS Stdout: You need to restart the Splunk Server (splunkd) for your changes to take effect. Stderr: sudo: unable to send audit message: Operation not permitted WARNING: Server Certificate Hostname Validation is disabled. Please see server.conf/[sslConfig]/cliVerifyServerName for details. 05:23:19 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Restarting Splunk to apply settings and TA 05:23:25 | DEBUG | IntegrationsSplunkViolati | Helpers | Caught exception. Retrying in 30s (attempt 0 of 20): org.apache.http.NoHttpResponseException: localhost:40727 failed to respond 05:23:59 | INFO | IntegrationsSplunkViolati | SplunkUtil | Waiting for Splunk to boot... 05:23:59 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | Splunkd status: {"links":{},"origin":"https://127.0.0.1:40727/services/server/health","updated":"2025-11-27T05:23:59+00:00","generator":{"build":"e9494146ae5c","version":"9.0.5"},"entry":[{"name":"splunkd","id":"https://127.0.0.1:40727/services/server/health/splunkd","updated":"1970-01-01T00:00:00+00:00","links":{"alternate":"/services/server/health/splunkd","list":"/services/server/health/splunkd"},"author":"system","acl":{"app":"","can_list":true,"can_write":true,"modifiable":false,"owner":"system","perms":{"read":["admin","splunk-system-role"],"write":[]},"removable":false,"sharing":"system"},"content":{"eai:acl":null,"features":{"File Monitor Input":{"features":{"Forwarder Ingestion Latency":{"health":"green"},"Ingestion Latency":{"health":"green"},"Large and Archive File Reader-0":{"health":"green"},"Real-time Reader-0":{"health":"green"}},"health":"green"},"Index Processor":{"features":{"Buckets":{"health":"green"},"Disk Space":{"health":"green"},"Index Optimization":{"health":"green"}},"health":"green"},"Search Scheduler":{"features":{"Scheduler Suppression":{"health":"green"},"Search Lag":{"health":"green"},"Searches Delayed":{"health":"green"},"Searches Skipped in the last 24 hours":{"health":"green"}},"health":"green"},"Workload Management":{"disabled":true,"health":"green"}},"health":"green"}}],"paging":{"total":1,"perPage":30,"offset":0},"messages":[]} 05:23:59 | INFO | IntegrationsSplunkViolati | SplunkUtil | Splunk has completed booting 05:23:59 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Configuring Stackrox TA 05:24:00 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6 is running 05:24:00 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6: [curl, http://127.0.0.1:10248/, --max-time, 2] 05:24:00 | DEBUG | | Kubernetes | Command exited with 7 05:24:00 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:24:00 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: FAILURE Stdout: Stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0curl: (7) Failed to connect to 127.0.0.1 port 10248: Connection refused 05:24:00 | DEBUG | IntegrationsSplunkViolati | Helpers | Calling services.AlertService.getViolations with 3 retries 05:24:00 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6 is running 05:24:00 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6: [curl, --insecure, --head, --request, GET, --max-time, 5, https://172.30.162.206:443] 05:24:00 | DEBUG | | Kubernetes | Command exited with 0 05:24:00 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:24:00 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: SUCCESS Stdout: HTTP/2 200 accept-ranges: bytes cache-control: no-store, no-cache content-security-policy: frame-ancestors 'self' content-type: text/html; charset=utf-8 last-modified: Wed, 26 Nov 2025 17:30:19 GMT strict-transport-security: max-age=31536000; includeSubDomains vary: Accept-Encoding x-content-type-options: nosniff x-frame-options: sameorigin x-xss-protection: 1; mode=block content-length: 1713 date: Thu, 27 Nov 2025 05:24:00 GMT Stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 1713 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 05:24:00 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:00 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:01 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:01 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:02 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:02 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:03 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:03 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:04 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:04 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:05 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:05 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:06 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:06 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:07 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:07 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:08 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:08 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:09 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:09 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:11 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:11 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:12 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:12 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:13 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:13 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:14 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:14 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:15 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:16 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:16 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:17 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:17 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:18 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:18 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:19 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:19 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:20 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:20 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:21 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:21 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:22 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:22 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:23 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:23 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:24 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:24 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:25 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:25 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:26 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:26 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:27 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:27 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:28 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:28 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:29 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:29 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:31 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:31 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:32 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:32 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:33 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:33 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:34 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:34 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:35 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:35 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:36 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:36 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:37 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:37 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:38 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:38 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:39 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:39 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Source Id 642df538-67cd-4e03-9ac6-372c5d10d0dd -> edge target key: 3 05:24:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> targetId: 15939c21-56a2-4c32-8772-761f6e237ee2 05:24:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1764221040.437994000 05:24:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Found source 642df538-67cd-4e03-9ac6-372c5d10d0dd -> target null in graph after 40.051s 05:24:40 | DEBUG | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Network baseline before lock call: deployment_id: "642df538-67cd-4e03-9ac6-372c5d10d0dd" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-splunk" peers { entity { info { type: DEPLOYMENT id: "15939c21-56a2-4c32-8772-761f6e237ee2" deployment { name: "central" } } } properties { port: 8443 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764221080 nanos: 344257000 } deployment_name: "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9" 05:24:40 | DEBUG | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Network baseline after lock call: deployment_id: "642df538-67cd-4e03-9ac6-372c5d10d0dd" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-splunk" peers { entity { info { type: DEPLOYMENT id: "15939c21-56a2-4c32-8772-761f6e237ee2" deployment { name: "central" } } } properties { port: 8443 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764221080 nanos: 344257000 } locked: true deployment_name: "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9" 05:24:40 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6 is running 05:24:40 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6: [curl, --insecure, --head, --request, GET, --max-time, 5, https://172.30.0.1:443] 05:24:40 | DEBUG | | Kubernetes | Command exited with 0 05:24:40 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:24:40 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: SUCCESS Stdout: HTTP/2 403 audit-id: 60e7e118-7b4c-4aef-909c-bb4fe807bbbb cache-control: no-cache, private content-type: application/json strict-transport-security: max-age=31536000; includeSubDomains; preload x-content-type-options: nosniff x-kubernetes-pf-flowschema-uid: 202b0513-82ba-48ba-98b3-265577490424 x-kubernetes-pf-prioritylevel-uid: a763f1b6-4b10-4e56-94dc-14b00dba6d40 content-length: 217 date: Thu, 27 Nov 2025 05:24:40 GMT Stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 217 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 05:24:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Source Id 642df538-67cd-4e03-9ac6-372c5d10d0dd -> edge target key: 3 05:24:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> targetId: 15939c21-56a2-4c32-8772-761f6e237ee2 05:24:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1764221040.437994000 05:24:40 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Found source 642df538-67cd-4e03-9ac6-372c5d10d0dd -> target null in graph after 0.051s 05:24:50 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6 is running 05:24:50 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6: [curl, --insecure, --head, --request, GET, --max-time, 5, https://172.30.0.1:443] 05:24:50 | DEBUG | | Kubernetes | Command exited with 0 05:24:50 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:24:50 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: SUCCESS Stdout: HTTP/2 403 audit-id: 3abefe85-5c07-4904-8a7b-1a779f9f7cdd cache-control: no-cache, private content-type: application/json strict-transport-security: max-age=31536000; includeSubDomains; preload x-content-type-options: nosniff x-kubernetes-pf-flowschema-uid: 202b0513-82ba-48ba-98b3-265577490424 x-kubernetes-pf-prioritylevel-uid: a763f1b6-4b10-4e56-94dc-14b00dba6d40 content-length: 217 date: Thu, 27 Nov 2025 05:24:50 GMT Stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 217 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 05:24:50 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:24:50 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:24:50 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Source Id 642df538-67cd-4e03-9ac6-372c5d10d0dd -> edge target key: 3 05:24:50 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> targetId: 15939c21-56a2-4c32-8772-761f6e237ee2 05:24:50 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1764221040.437994000 05:24:50 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Found source 642df538-67cd-4e03-9ac6-372c5d10d0dd -> target null in graph after 0.051s 05:25:00 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6 is running 05:25:00 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6: [curl, --insecure, --head, --request, GET, --max-time, 5, https://172.30.0.1:443] 05:25:01 | DEBUG | | Kubernetes | Command exited with 0 05:25:01 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:25:01 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: SUCCESS Stdout: HTTP/2 403 audit-id: 97cc0257-bda3-47d7-9063-763458152b07 cache-control: no-cache, private content-type: application/json strict-transport-security: max-age=31536000; includeSubDomains; preload x-content-type-options: nosniff x-kubernetes-pf-flowschema-uid: 202b0513-82ba-48ba-98b3-265577490424 x-kubernetes-pf-prioritylevel-uid: a763f1b6-4b10-4e56-94dc-14b00dba6d40 content-length: 217 date: Thu, 27 Nov 2025 05:25:01 GMT Stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 217 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 05:25:01 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:25:01 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:25:01 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Source Id 642df538-67cd-4e03-9ac6-372c5d10d0dd -> edge target key: 3 05:25:01 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> targetId: 15939c21-56a2-4c32-8772-761f6e237ee2 05:25:01 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1764221040.437994000 05:25:01 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Found source 642df538-67cd-4e03-9ac6-372c5d10d0dd -> target null in graph after 0.049s 05:25:11 | DEBUG | IntegrationsSplunkViolati | Kubernetes | First container in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6 is running 05:25:11 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Exec-ing the following command in pod splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6: [curl, --insecure, --head, --request, GET, --max-time, 5, https://172.30.0.1:443] 05:25:11 | DEBUG | | Kubernetes | Command exited with 0 05:25:11 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:25:11 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Command status: SUCCESS Stdout: HTTP/2 403 audit-id: f56d2d43-d86b-4a33-a231-2c4c106f7f68 cache-control: no-cache, private content-type: application/json strict-transport-security: max-age=31536000; includeSubDomains; preload x-content-type-options: nosniff x-kubernetes-pf-flowschema-uid: 202b0513-82ba-48ba-98b3-265577490424 x-kubernetes-pf-prioritylevel-uid: a763f1b6-4b10-4e56-94dc-14b00dba6d40 content-length: 217 date: Thu, 27 Nov 2025 05:25:11 GMT Stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 217 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 05:25:11 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Checking for edge between deployments: sourceId 642df538-67cd-4e03-9ac6-372c5d10d0dd, targetId null 05:25:11 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:25:11 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Source Id 642df538-67cd-4e03-9ac6-372c5d10d0dd -> edge target key: 144 05:25:11 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> targetId: ada12424-bde3-4313-b810-bb463cbe8f90 05:25:11 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> edge: 443 L4_PROTOCOL_TCP 1764221111.250506463 05:25:11 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Source Id 642df538-67cd-4e03-9ac6-372c5d10d0dd -> edge target key: 3 05:25:11 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> targetId: 15939c21-56a2-4c32-8772-761f6e237ee2 05:25:11 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1764221111.250341340 05:25:11 | DEBUG | IntegrationsSplunkViolati | NetworkGraphUtil | Found source 642df538-67cd-4e03-9ac6-372c5d10d0dd -> target null in graph after 0.05s 05:25:11 | DEBUG | IntegrationsSplunkViolati | Helpers | Calling services.AlertService.getViolations with 3 retries 05:25:11 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | {"sid":"1764221111.2"} 05:25:11 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | New Search created: 1764221111.2 05:25:27 | DEBUG | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Violations currently indexed in Splunk: [[_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:222915, _indextime:1764221103, _raw:{"violationInfo": {"violationId": "b5fa6c20-ebce-5830-b5ff-f0a24e83e023", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:24:50.825593952Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:0, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.825593, _time:2025-11-27T05:24:50.825+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:222837, _indextime:1764221093, _raw:{"violationInfo": {"violationId": "a24b5159-fd51-545e-9923-4928a432847f", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:24:40.650636060Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:1, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.650636, _time:2025-11-27T05:24:40.650+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68575, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7d85befd-a71c-533e-925c-d496b5daa4e8", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.162.206:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.162.206:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:24:00.395069198Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:2, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.395069, _time:2025-11-27T05:24:00.395+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:195045, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "dc19e2ff-e358-4ffb-ae64-d17a614fe23d", "violationMessage": "Binary '/usr/bin/curl' executed with arguments 'http://127.0.0.1:10248/ --max-time 2' under user ID 999", "violationType": "PROCESS_EVENT", "violationTime": "2025-11-27T05:24:00.230481435Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "podUid": "9e95252e-aa90-552a-a130-a62a90db7059", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "containerStartTime": "2025-11-27T05:22:41Z", "containerId": "3f15652cec44"}, "alertInfo": {"alertId": "e14e7a24-8cd8-49e3-b218-fdb8d5d0f355", "lifecycleStage": "RUNTIME"}, "processInfo": {"processViolationId": "dc19e2ff-e358-4ffb-ae64-d17a614fe23d", "processSignalId": "47964fd2-cb51-11f0-80f2-0a580a800220", "processCreationTime": "2025-11-27T05:24:00.230481435Z", "processName": "curl", "processArgs": "http://127.0.0.1:10248/ --max-time 2", "execFilePath": "/usr/bin/curl", "pid": 61829, "processUid": 999, "processGid": 999}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "86804b96-e87e-4eae-b56e-1718a8a55763", "policyName": "Process Targeting Cluster Kubelet Endpoint", "policyDescription": "Detects misuse of the healthz/kubelet API/heapster endpoint", "policyRationale": "A pod communicating to a Kubernetes API from via command line is highly irregular", "policyCategories": ["Kubernetes"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:3, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.230481, _time:2025-11-27T05:24:00.230+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68653, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "06585e7a-363e-5fcc-b8ff-449b8d8c3a39", "violationMessage": "Kubernetes API received exec 'curl http://127.0.0.1:10248/ --max-time 2' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl http://127.0.0.1:10248/ --max-time 2"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:24:00.209793622Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:4, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.209793, _time:2025-11-27T05:24:00.209+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179331, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "b988d7fc-9062-5f5a-8610-1db5cdbf7a05", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:59.575940477Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:5, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.575940, _time:2025-11-27T05:23:59.575+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179398, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "4a3c93ff-6abf-5616-813f-680c87fcb173", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:59.399722287Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:6, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.399722, _time:2025-11-27T05:23:59.399+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179465, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "65fa255f-f525-59e3-93ab-b4da16d58bbe", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:59.107988783Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:7, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.107988, _time:2025-11-27T05:23:59.107+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179532, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "0734996b-b3da-56db-a912-15296df6ae5f", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:55.952404645Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:8, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.952404, _time:2025-11-27T05:23:55.952+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179599, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "01a9e69c-1301-5156-acfe-01128abf3227", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:19.715598987Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:9, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.715598, _time:2025-11-27T05:23:19.715+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68729, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8aac1e45-91a0-5061-ae97-e79498ba5b49", "violationMessage": "Kubernetes API received exec 'sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:18.817495002Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:10, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.817495, _time:2025-11-27T05:23:18.817+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179666, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "0c3098e7-e18b-5960-8cd3-7b13597f7d09", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:17.887987642Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:11, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.887987, _time:2025-11-27T05:23:17.887+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179733, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e8ae6842-7cbe-50b1-9b0d-ff6665cf452f", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.889922658Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:12, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.889922, _time:2025-11-27T05:23:15.889+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68807, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "95203f9c-b77f-5ce2-8f22-b263990e2c5f", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; exit $e' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; exit $e"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.796700397Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:13, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.796700, _time:2025-11-27T05:23:15.796+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68891, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6ef50fd3-85ba-5573-8853-0eb9b8834b07", "violationMessage": "Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar'' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar'"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.704945449Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:14, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.704945, _time:2025-11-27T05:23:15.704+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68969, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8d9897f3-6552-5b2f-a039-f34b4a27f46d", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar' && echo $?' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar' && echo $?"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.501902042Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:15, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.501902, _time:2025-11-27T05:23:15.501+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:69049, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "b08690de-61fd-589a-8768-5ad154478670", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; exit $e' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; exit $e"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.398744176Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:16, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.398744, _time:2025-11-27T05:23:15.398+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:69133, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "a86c3734-d3cb-57ec-8ec5-a9dafd8d026e", "violationMessage": "Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar'' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar'"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.278181996Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:17, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.278181, _time:2025-11-27T05:23:15.278+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:69211, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "9a40206c-8b06-52dd-8b36-db5500bb69cb", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar' && echo $?' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar' && echo $?"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:14.976624896Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:18, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.976624, _time:2025-11-27T05:23:14.976+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179800, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "774f3bbb-35ba-5a2f-ac70-e139e79ee239", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:13.832243473Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:19, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.832243, _time:2025-11-27T05:23:13.832+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179867, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6d58e069-5661-58eb-9789-7323c035b653", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:03.754860569Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:20, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.754860, _time:2025-11-27T05:23:03.754+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:111096, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "80ec2b09-aede-4c61-b408-64009272a558", "violationMessage": "Container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' includes component 'microdnf' (version 3.8.0-2.el8.x86_64)\nContainer 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' includes component 'rpm' (version 4.14.3-26.el8.x86_64)", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.901477622Z"}, "alertInfo": {"alertId": "80ec2b09-aede-4c61-b408-64009272a558", "alertFirstOccurred": "2025-11-27T05:22:59.901477622Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "f95ff08d-130a-465a-a27e-32ed1fb05555", "policyName": "Red Hat Package Manager in Image", "policyDescription": "Alert on deployments with components of the Red Hat/Fedora/CentOS package management system.", "policyRationale": "Package managers make it easier for attackers to use compromised containers, since they can easily add software.", "policyCategories": ["Security Best Practices"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "LOW_SEVERITY", "policyVersion": "1.1"}}, _serial:21, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.901477, _time:2025-11-27T05:22:59.901+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:191492, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "dd23737f-ec6f-41eb-812a-25114376a1f2", "violationMessage": "Fixable CVE-2019-16942 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.1\nFixable CVE-2019-16943 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.1\nFixable CVE-2019-17531 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.1\nFixable CVE-2019-20330 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.2\nFixable CVE-2020-10650 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-10672 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-10673 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-10968 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-10969 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11111 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11112 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11113 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11619 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11620 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-13949 (CVSS 7.5) (severity Important) found in component 'hive' (version 3.1.3) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 4.0.0\nFixable CVE-2020-14060 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5\nFixable CVE-2020-14061 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5\nFixable CVE-2020-14062 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5\nFixable CVE-2020-14195 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5\nFixable CVE-2020-24616 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.6\nFixable CVE-2020-24750 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.6\nFixable CVE-2020-25649 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.7\nFixable CVE-2020-35490 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-35491 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-35728 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36179 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36180 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36181 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36182 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36183 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36184 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36185 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36186 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36187 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36188 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36189 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36518 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.12.6.1\nFixable CVE-2020-8840 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.3\nFixable CVE-2020-9546 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-9547 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-9548 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2021-20190 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.7\nFixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2019.6.16) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2022.12.7\nFixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2022.9.24) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2022.12.7\nFixable CVE-2022-3171 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 3.16.3\nFixable CVE-2022-42003 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.12.7.1\nFixable CVE-2022-42004 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.12.7.1\nFixable CVE-2023-0341 (CVSS 7.8) (severity Important) found in component 'editorconfig' (version 0.12.3) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0.12.6\nFixable CVE-2023-2976 (CVSS 7.1) (severity Important) found in component 'guava' (version 11.0.2) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 32.0.0\nFixable CVE-2023-37920 (CVSS 9.8) (severity Critical) found in component 'certifi' (version 2019.6.16) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2023.7.22\nFixable CVE-2023-38325 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 41.0.2\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.12) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.26.17\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.6) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.26.17\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 2.0.2) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.0.6\nFixable CVE-2023-49083 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 41.0.6\nFixable CVE-2023-50782 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 42.0.0\nFixable CVE-2024-26130 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 42.0.4\nFixable CVE-2024-7254 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 3.25.5\nFixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.10.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.15.2\nFixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.11.2) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.15.2\nFixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 47.1.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 78.1.1\nFixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 67.8.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 78.1.1\nFixable CVE-2025-47436 (CVSS 9.8) (severity Critical) found in component 'orc' (version 1.5.8) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.8.9\nFixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-25.el8_8\nFixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-25.el8_8\nFixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.1\nFixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.1\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5837 (CVSS 7.5) (severity Important) found in component 'libnghttp2' (version 1.33.0-3.el8_2.1.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.33.0-5.el8_8\nFixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.2\nFixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.2\nFixable RHSA-2024:10379 (CVSS 7.4) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.3.1-36.el8_10\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-62.el8_10\nFixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-62.el8_10\nFixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'platform-python-setuptools' (version 39.2.0-7.el8.noarch) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:39.2.0-8.el8_10\nFixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'python3-setuptools-wheel' (version 39.2.0-7.el8.noarch) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:39.2.0-8.el8_10\nFixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-30.el8_10\nFixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-30.el8_10\nFixable RHSA-2025:10027 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.3.1-37.el8_10\nFixable RHSA-2025:10110 (CVSS 7) (severity Important) found in component 'sudo' (version 1.8.29-10.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.9.5p2-1.el8_10.1\nFixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-70.el8_10\nFixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-70.el8_10\nFixable RHSA-2025:10698 (CVSS 9.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.9.7-21.el8_10.1\nFixable RHSA-2025:12010 (CVSS 7.7) (severity Important) found in component 'sqlite-libs' (version 3.26.0-17.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.26.0-20.el8_10\nFixable RHSA-2025:12450 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.9.7-21.el8_10.2\nFixable RHSA-2025:14135 (CVSS 7.3) (severity Important) found in component 'libarchive' (version 3.3.3-5.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.3.3-6.el8_10\nFixable RHSA-2025:14557 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.3.1-38.el8_10\nFixable RHSA-2025:21776 (CVSS 5.3) (severity Important) found in component 'expat' (version 2.2.5-11.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.5.0-1.el8_10\nFixable RHSA-2025:2686 (CVSS 8.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.9.7-19.el8_10", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.900774486Z"}, "alertInfo": {"alertId": "dd23737f-ec6f-41eb-812a-25114376a1f2", "alertFirstOccurred": "2025-11-27T05:22:59.900774486Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "a919ccaf-6b43-4160-ac5d-a405e1440a41", "policyName": "Fixable Severity at least Important", "policyDescription": "Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important", "policyRationale": "Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s).", "policyCategories": ["Vulnerability Management"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:22, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.900774, _time:2025-11-27T05:22:59.900+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:102977, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "77b1132f-4fe2-4347-a5af-3b7241e9c3d6", "violationMessage": "CPU request set to 0 cores for container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'\nMemory limit set to 0 MB for container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.893566523Z"}, "alertInfo": {"alertId": "77b1132f-4fe2-4347-a5af-3b7241e9c3d6", "alertFirstOccurred": "2025-11-27T05:22:59.893566523Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "886c3c94-3a6a-4f2b-82fc-d6bf5a310840", "policyName": "No CPU request or memory limit specified", "policyDescription": "Alert on deployments that have containers without CPU request or memory limit", "policyRationale": "A container without a specified CPU request may be starved for CPU time, while a container without a specified memory limit may cause the host to become over-provisioned.", "policyCategories": ["DevOps Best Practices", "Docker CIS"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:23, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.893566, _time:2025-11-27T05:22:59.893+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:133245, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "9b208c57-298c-4e60-9010-46129f88e4df", "violationMessage": "Deployment mounts the service account tokens.\nNamespace has name 'qa-splunk'\nService Account is set to 'default'", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.893471221Z"}, "alertInfo": {"alertId": "9b208c57-298c-4e60-9010-46129f88e4df", "alertFirstOccurred": "2025-11-27T05:22:59.893471221Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "fb8f8732-c31d-496b-8fb1-d5abe6056e27", "policyName": "Pod Service Account Token Automatically Mounted", "policyDescription": "Protect pod default service account tokens from compromise by minimizing the mounting of the default service account token to only those pods whose application requires interaction with the Kubernetes API.", "policyRationale": "By default, Kubernetes automatically provisions a service account for each pod and mounts the secret at runtime. This service account is not typically used. If this pod is compromised and the compromised user has access to the service account, the service account could be used to escalate privileges within the cluster. To reduce the likelihood of privilege escalation this service account should not be mounted by default unless the pod requires direct access to the Kubernetes API as part of the pods functionality.", "policyCategories": ["Privileges", "Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:24, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.893471, _time:2025-11-27T05:22:59.893+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:198280, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e548ab37-cb13-4384-b4f9-be4a1f478da6", "violationMessage": "Environment variable 'SPLUNK_PASSWORD' is present in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.893416399Z"}, "alertInfo": {"alertId": "e548ab37-cb13-4384-b4f9-be4a1f478da6", "alertFirstOccurred": "2025-11-27T05:22:59.893416399Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "f4996314-c3d7-4553-803b-b24ce7febe48", "policyName": "Environment Variable Contains Secret", "policyDescription": "Alert on deployments with environment variables that contain 'SECRET'", "policyRationale": "Using secrets in environment variables may allow inspection into your secrets from the host or even through the orchestrator UI.", "policyCategories": ["Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:25, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.893416, _time:2025-11-27T05:22:59.893+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:219250, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "fa69e6ff-bcab-4f34-b50b-e084b1c11f8c", "violationMessage": "Container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' allows privilege escalation", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.892935189Z"}, "alertInfo": {"alertId": "fa69e6ff-bcab-4f34-b50b-e084b1c11f8c", "alertFirstOccurred": "2025-11-27T05:22:59.892935189Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "16c95922-08c4-41b6-a721-dc4b2a806632", "policyName": "Container with privilege escalation allowed", "policyDescription": "Alerts if a deployment has containers with allowPrivilegeEscalation set to true in its security context.", "policyRationale": "A container process can run with more privileges than its parent process if the container's security context has the boolean setting allowPrivilegeEscalation enabled. In Kubernetes pods, this setting is true by default. Set the value to false if the pod is to run as a non-root user.", "policyCategories": ["Privileges", "Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:26, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.892935, _time:2025-11-27T05:22:59.892+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:77612, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "5d2a43b4-2797-4944-bce4-ecfc87d1724c", "violationMessage": "Container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' has image created at 2023-06-03 01:21:18 (UTC)", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.892911488Z"}, "alertInfo": {"alertId": "5d2a43b4-2797-4944-bce4-ecfc87d1724c", "alertFirstOccurred": "2025-11-27T05:22:59.892911488Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "2db9a279-2aec-4618-a85d-7f1bdf4911b1", "policyName": "90-Day Image Age", "policyDescription": "Alert on deployments with images that haven't been updated in 90 days", "policyRationale": "Base images are updated frequently with bug fixes and vulnerability patches. Image age exceeding 90 days may indicate a higher risk of vulnerabilities existing in the image.", "policyCategories": ["DevOps Best Practices", "Security Best Practices", "Supply Chain Security"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "LOW_SEVERITY", "policyVersion": "1.1"}}, _serial:27, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.892911, _time:2025-11-27T05:22:59.892+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179934, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "60ab0342-7087-5278-a1c5-93033f99dd2a", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:22:53.693516480Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:28, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.693516, _time:2025-11-27T05:22:53.693+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:180001, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "fe0ffa45-ea88-59ea-9bc5-2dcd01dd4ea1", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:22:43.622314637Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:29, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.622314, _time:2025-11-27T05:22:43.622+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:123701, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8fdaa510-641f-4ae1-b241-cdb863c1811d", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.497728555Z"}, "alertInfo": {"alertId": "8fdaa510-641f-4ae1-b241-cdb863c1811d", "alertFirstOccurred": "2025-11-27T05:20:28.497728555Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:30, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.497728, _time:2025-11-27T05:20:28.497+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:202279, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "ea4473cc-cf05-4067-81e7-bc4d8cbb5b43", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.410415400Z"}, "alertInfo": {"alertId": "ea4473cc-cf05-4067-81e7-bc4d8cbb5b43", "alertFirstOccurred": "2025-11-27T05:20:28.410415400Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:31, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.410415, _time:2025-11-27T05:20:28.410+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:202500, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "ea7c47f2-50ef-4ca6-8e6b-b062aaadee08", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.222047488Z"}, "alertInfo": {"alertId": "ea7c47f2-50ef-4ca6-8e6b-b062aaadee08", "alertFirstOccurred": "2025-11-27T05:20:28.222047488Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:32, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.222047, _time:2025-11-27T05:20:28.222+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:202612, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "eaa7a39a-c976-402f-9a60-c316789701b6", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.221979587Z"}, "alertInfo": {"alertId": "eaa7a39a-c976-402f-9a60-c316789701b6", "alertFirstOccurred": "2025-11-27T05:20:28.221979587Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:33, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.221979, _time:2025-11-27T05:20:28.221+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:11883, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "1023c391-7d30-44b7-907b-aa2c0ddd96d1", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.221585658Z"}, "alertInfo": {"alertId": "1023c391-7d30-44b7-907b-aa2c0ddd96d1", "alertFirstOccurred": "2025-11-27T05:20:28.221585658Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:34, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.221585, _time:2025-11-27T05:20:28.221+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:153918, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "b390365d-0f9e-4d2d-aa9d-bff80b657fc8", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.217622628Z"}, "alertInfo": {"alertId": "b390365d-0f9e-4d2d-aa9d-bff80b657fc8", "alertFirstOccurred": "2025-11-27T05:20:28.217622628Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:35, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.217622, _time:2025-11-27T05:20:28.217+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:86006, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6766b714-2d5d-4e9b-9d6c-5dd2c15b85ac", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.149673431Z"}, "alertInfo": {"alertId": "6766b714-2d5d-4e9b-9d6c-5dd2c15b85ac", "alertFirstOccurred": "2025-11-27T05:20:28.149673431Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:36, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.149673, _time:2025-11-27T05:20:28.149+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:23239, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "1bacde3c-d6a8-40af-a188-d7f5ea3338dc", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.103362713Z"}, "alertInfo": {"alertId": "1bacde3c-d6a8-40af-a188-d7f5ea3338dc", "alertFirstOccurred": "2025-11-27T05:20:28.103362713Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:37, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.103362, _time:2025-11-27T05:20:28.103+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:201736, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e9b3e6e7-5652-4887-bf0a-f5857c9c62b8", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.103281951Z"}, "alertInfo": {"alertId": "e9b3e6e7-5652-4887-bf0a-f5857c9c62b8", "alertFirstOccurred": "2025-11-27T05:20:28.103281951Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:38, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.103281, _time:2025-11-27T05:20:28.103+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:150235, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "ae424497-b7bd-49be-a236-e54d00039253", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.102040863Z"}, "alertInfo": {"alertId": "ae424497-b7bd-49be-a236-e54d00039253", "alertFirstOccurred": "2025-11-27T05:20:28.102040863Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:39, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.102040, _time:2025-11-27T05:20:28.102+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:62723, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "4bec9b1e-265c-45d6-8711-e36df4fc11e9", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.097373318Z"}, "alertInfo": {"alertId": "4bec9b1e-265c-45d6-8711-e36df4fc11e9", "alertFirstOccurred": "2025-11-27T05:20:28.097373318Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:40, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.097373, _time:2025-11-27T05:20:28.097+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:199146, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e7488ffc-730e-4ce4-ade4-b548070b020e", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.095140477Z"}, "alertInfo": {"alertId": "e7488ffc-730e-4ce4-ade4-b548070b020e", "alertFirstOccurred": "2025-11-27T05:20:28.095140477Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:41, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.095140, _time:2025-11-27T05:20:28.095+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:60736, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "49e6d51c-ae4f-4fa1-8c89-7ea82cf9606b", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.094709837Z"}, "alertInfo": {"alertId": "49e6d51c-ae4f-4fa1-8c89-7ea82cf9606b", "alertFirstOccurred": "2025-11-27T05:20:28.094709837Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:42, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.094709, _time:2025-11-27T05:20:28.094+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:9325, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "0c6ae6ab-d255-41d6-8113-bc5a76ef7a3b", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.074049610Z"}, "alertInfo": {"alertId": "0c6ae6ab-d255-41d6-8113-bc5a76ef7a3b", "alertFirstOccurred": "2025-11-27T05:20:28.074049610Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:43, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.074049, _time:2025-11-27T05:20:28.074+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:93705, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6dcc405d-62ce-4026-9d14-349d134279f3", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.056405351Z"}, "alertInfo": {"alertId": "6dcc405d-62ce-4026-9d14-349d134279f3", "alertFirstOccurred": "2025-11-27T05:20:28.056405351Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:44, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.056405, _time:2025-11-27T05:20:28.056+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:107408, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7cb256e6-cd38-4759-b1d0-2789b59f385c", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.055693505Z"}, "alertInfo": {"alertId": "7cb256e6-cd38-4759-b1d0-2789b59f385c", "alertFirstOccurred": "2025-11-27T05:20:28.055693505Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:45, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.055693, _time:2025-11-27T05:20:28.055+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:105152, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "79da2009-dc25-4d01-a55c-b0aa61c1091e", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.894311344Z"}, "alertInfo": {"alertId": "79da2009-dc25-4d01-a55c-b0aa61c1091e", "alertFirstOccurred": "2025-11-27T05:20:27.894311344Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:46, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.894311, _time:2025-11-27T05:20:27.894+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:138604, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "a1191d6f-3b2a-4d35-9029-6fc39b46ed88", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.894241412Z"}, "alertInfo": {"alertId": "a1191d6f-3b2a-4d35-9029-6fc39b46ed88", "alertFirstOccurred": "2025-11-27T05:20:27.894241412Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:47, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.894241, _time:2025-11-27T05:20:27.894+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:46860, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "37ff2b27-e1b2-48c6-af71-5a1039500137", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.893683119Z"}, "alertInfo": {"alertId": "37ff2b27-e1b2-48c6-af71-5a1039500137", "alertFirstOccurred": "2025-11-27T05:20:27.893683119Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:48, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.893683, _time:2025-11-27T05:20:27.893+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:54032, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "41cf2359-0e3e-4809-89b4-7ddafea39dd8", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.889313970Z"}, "alertInfo": {"alertId": "41cf2359-0e3e-4809-89b4-7ddafea39dd8", "alertFirstOccurred": "2025-11-27T05:20:27.889313970Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:49, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.889313, _time:2025-11-27T05:20:27.889+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:29926, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "244026f7-62ac-468a-af0c-c967af27d440", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.861982452Z"}, "alertInfo": {"alertId": "244026f7-62ac-468a-af0c-c967af27d440", "alertFirstOccurred": "2025-11-27T05:20:27.861982452Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:50, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.861982, _time:2025-11-27T05:20:27.861+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:219749, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "fadc9c7e-6147-466f-8338-bc41171a22a3", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.861767787Z"}, "alertInfo": {"alertId": "fadc9c7e-6147-466f-8338-bc41171a22a3", "alertFirstOccurred": "2025-11-27T05:20:27.861767787Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:51, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.861767, _time:2025-11-27T05:20:27.861+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:60320, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "494110d4-9cfb-4f1a-8fc7-286ce1ec6aaa", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.813848443Z"}, "alertInfo": {"alertId": "494110d4-9cfb-4f1a-8fc7-286ce1ec6aaa", "alertFirstOccurred": "2025-11-27T05:20:27.813848443Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:52, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.813848, _time:2025-11-27T05:20:27.813+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:94102, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6e2b7a51-344f-4e40-8696-05a3caa9d8f9", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.812954333Z"}, "alertInfo": {"alertId": "6e2b7a51-344f-4e40-8696-05a3caa9d8f9", "alertFirstOccurred": "2025-11-27T05:20:27.812954333Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:53, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.812954, _time:2025-11-27T05:20:27.812+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:54224, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "4219ecc4-0657-4f3f-8e65-b1e02c73dc60", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.785467881Z"}, "alertInfo": {"alertId": "4219ecc4-0657-4f3f-8e65-b1e02c73dc60", "alertFirstOccurred": "2025-11-27T05:20:27.785467881Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:54, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.785467, _time:2025-11-27T05:20:27.785+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:170272, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "c7d2c760-f15c-4a5d-9036-bc5344476ddb", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.777545122Z"}, "alertInfo": {"alertId": "c7d2c760-f15c-4a5d-9036-bc5344476ddb", "alertFirstOccurred": "2025-11-27T05:20:27.777545122Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:55, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.777545, _time:2025-11-27T05:20:27.777+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:6379, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "08243a3a-6212-413f-9e34-280468ebc434", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.772035977Z"}, "alertInfo": {"alertId": "08243a3a-6212-413f-9e34-280468ebc434", "alertFirstOccurred": "2025-11-27T05:20:27.772035977Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:56, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.772035, _time:2025-11-27T05:20:27.772+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:41097, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "30ee1ed7-f4c8-4b55-8768-456ab0cf51c1", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.765400647Z"}, "alertInfo": {"alertId": "30ee1ed7-f4c8-4b55-8768-456ab0cf51c1", "alertFirstOccurred": "2025-11-27T05:20:27.765400647Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:57, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.765400, _time:2025-11-27T05:20:27.765+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:61879, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "4a99896c-f19d-4586-b6eb-fe37dbb8323a", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.764980527Z"}, "alertInfo": {"alertId": "4a99896c-f19d-4586-b6eb-fe37dbb8323a", "alertFirstOccurred": "2025-11-27T05:20:27.764980527Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:58, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.764980, _time:2025-11-27T05:20:27.764+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:207918, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "f2934833-88ff-433a-b360-f53f5d50f65e", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.743456920Z"}, "alertInfo": {"alertId": "f2934833-88ff-433a-b360-f53f5d50f65e", "alertFirstOccurred": "2025-11-27T05:20:27.743456920Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:59, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.743456, _time:2025-11-27T05:20:27.743+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:119149, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8af6f2d6-b3cf-4941-87a7-1dd3397c6a18", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.743024881Z"}, "alertInfo": {"alertId": "8af6f2d6-b3cf-4941-87a7-1dd3397c6a18", "alertFirstOccurred": "2025-11-27T05:20:27.743024881Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:60, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.743024, _time:2025-11-27T05:20:27.743+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:27020, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "20d8221a-bef7-48ff-bc01-a7c1ace83f93", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.580147246Z"}, "alertInfo": {"alertId": "20d8221a-bef7-48ff-bc01-a7c1ace83f93", "alertFirstOccurred": "2025-11-27T05:20:27.580147246Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:61, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.580147, _time:2025-11-27T05:20:27.580+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:31597, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "25f8dd53-fbd5-4361-9cbb-54348ec56100", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.580129875Z"}, "alertInfo": {"alertId": "25f8dd53-fbd5-4361-9cbb-54348ec56100", "alertFirstOccurred": "2025-11-27T05:20:27.580129875Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:62, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.580129, _time:2025-11-27T05:20:27.580+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:199681, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e7eb3470-3de0-41ca-b800-985459331b68", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.580035473Z"}, "alertInfo": {"alertId": "e7eb3470-3de0-41ca-b800-985459331b68", "alertFirstOccurred": "2025-11-27T05:20:27.580035473Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:63, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.580035, _time:2025-11-27T05:20:27.580+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:123263, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8efbf4ef-be56-49f0-b5e6-45ac3db4acdd", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.573188538Z"}, "alertInfo": {"alertId": "8efbf4ef-be56-49f0-b5e6-45ac3db4acdd", "alertFirstOccurred": "2025-11-27T05:20:27.573188538Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:64, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.573188, _time:2025-11-27T05:20:27.573+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:113325, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "83750eb8-eccf-40ab-92a8-3f55d1c42a76", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.573171338Z"}, "alertInfo": {"alertId": "83750eb8-eccf-40ab-92a8-3f55d1c42a76", "alertFirstOccurred": "2025-11-27T05:20:27.573171338Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:65, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.573171, _time:2025-11-27T05:20:27.573+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:103037, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "77e0beab-e45c-42c9-b9ad-0adb907c1166", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.515850381Z"}, "alertInfo": {"alertId": "77e0beab-e45c-42c9-b9ad-0adb907c1166", "alertFirstOccurred": "2025-11-27T05:20:27.515850381Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:66, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.515850, _time:2025-11-27T05:20:27.515+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:127228, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "941488d0-4008-40cc-95ed-bb2661e31a27", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.515807530Z"}, "alertInfo": {"alertId": "941488d0-4008-40cc-95ed-bb2661e31a27", "alertFirstOccurred": "2025-11-27T05:20:27.515807530Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:67, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.515807, _time:2025-11-27T05:20:27.515+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:209171, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "f40e1cb6-cefa-4b40-b4d5-28655c84383f", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.510527681Z"}, "alertInfo": {"alertId": "f40e1cb6-cefa-4b40-b4d5-28655c84383f", "alertFirstOccurred": "2025-11-27T05:20:27.510527681Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:68, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.510527, _time:2025-11-27T05:20:27.510+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:67063, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "5111664b-418a-4ec7-8288-6ceb49c1d7c3", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.477956054Z"}, "alertInfo": {"alertId": "5111664b-418a-4ec7-8288-6ceb49c1d7c3", "alertFirstOccurred": "2025-11-27T05:20:27.477956054Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:69, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.477956, _time:2025-11-27T05:20:27.477+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:40654, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "30378015-ac84-4f9f-8a09-71e220f10dd0", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.457541972Z"}, "alertInfo": {"alertId": "30378015-ac84-4f9f-8a09-71e220f10dd0", "alertFirstOccurred": "2025-11-27T05:20:27.457541972Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:70, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.457541, _time:2025-11-27T05:20:27.457+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:211943, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "f621e68d-ec8e-4f4e-8749-5afdf9ed9471", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.456544579Z"}, "alertInfo": {"alertId": "f621e68d-ec8e-4f4e-8749-5afdf9ed9471", "alertFirstOccurred": "2025-11-27T05:20:27.456544579Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:71, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.456544, _time:2025-11-27T05:20:27.456+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:193169, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "de42bd44-525a-4e3e-9f1b-ccece654be72", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.456201972Z"}, "alertInfo": {"alertId": "de42bd44-525a-4e3e-9f1b-ccece654be72", "alertFirstOccurred": "2025-11-27T05:20:27.456201972Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:72, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.456201, _time:2025-11-27T05:20:27.456+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:95999, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6fbeb7d5-1081-407c-87ce-e4318ba009d2", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.455134907Z"}, "alertInfo": {"alertId": "6fbeb7d5-1081-407c-87ce-e4318ba009d2", "alertFirstOccurred": "2025-11-27T05:20:27.455134907Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:73, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.455134, _time:2025-11-27T05:20:27.455+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:46539, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "37a14544-fd7b-4640-b435-d17438fb1031", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.451637458Z"}, "alertInfo": {"alertId": "37a14544-fd7b-4640-b435-d17438fb1031", "alertFirstOccurred": "2025-11-27T05:20:27.451637458Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:74, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.451637, _time:2025-11-27T05:20:27.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:181487, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "d4e49f6d-4ab7-45d7-8494-3411c0536f92", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.441735574Z"}, "alertInfo": {"alertId": "d4e49f6d-4ab7-45d7-8494-3411c0536f92", "alertFirstOccurred": "2025-11-27T05:20:27.441735574Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:75, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.441735, _time:2025-11-27T05:20:27.441+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:200637, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e89a474a-d0ab-4f29-84a3-637a629e2ff1", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.438323097Z"}, "alertInfo": {"alertId": "e89a474a-d0ab-4f29-84a3-637a629e2ff1", "alertFirstOccurred": "2025-11-27T05:20:27.438323097Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:76, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.438323, _time:2025-11-27T05:20:27.438+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:23288, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "1bb92401-9b77-4bde-8581-47274cc62ee1", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.210865101Z"}, "alertInfo": {"alertId": "1bb92401-9b77-4bde-8581-47274cc62ee1", "alertFirstOccurred": "2025-11-27T05:20:27.210865101Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:77, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.210865, _time:2025-11-27T05:20:27.210+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:132008, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "9a751e9a-8ad6-409e-899a-553f5522034c", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.210687497Z"}, "alertInfo": {"alertId": "9a751e9a-8ad6-409e-899a-553f5522034c", "alertFirstOccurred": "2025-11-27T05:20:27.210687497Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:78, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.210687, _time:2025-11-27T05:20:27.210+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:53109, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "3fedb1d2-fee3-4c8d-aeb9-fc82f3d81e1b", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.210666506Z"}, "alertInfo": {"alertId": "3fedb1d2-fee3-4c8d-aeb9-fc82f3d81e1b", "alertFirstOccurred": "2025-11-27T05:20:27.210666506Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:79, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.210666, _time:2025-11-27T05:20:27.210+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:147358, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "aaed267e-b60e-4ec5-b6fe-f3a55c42ac9d", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.195867492Z"}, "alertInfo": {"alertId": "aaed267e-b60e-4ec5-b6fe-f3a55c42ac9d", "alertFirstOccurred": "2025-11-27T05:20:27.195867492Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:80, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.195867, _time:2025-11-27T05:20:27.195+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:111536, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "81a775e4-8360-4aec-a30b-e9610cd92ddd", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.187610255Z"}, "alertInfo": {"alertId": "81a775e4-8360-4aec-a30b-e9610cd92ddd", "alertFirstOccurred": "2025-11-27T05:20:27.187610255Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:81, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.187610, _time:2025-11-27T05:20:27.187+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:97129, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7135c7d1-2f72-4822-acd0-5c70843d767d", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.187382960Z"}, "alertInfo": {"alertId": "7135c7d1-2f72-4822-acd0-5c70843d767d", "alertFirstOccurred": "2025-11-27T05:20:27.187382960Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:82, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.187382, _time:2025-11-27T05:20:27.187+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:51340, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "3db5046a-2bb4-4646-904f-e8fd6a170dff", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.186180503Z"}, "alertInfo": {"alertId": "3db5046a-2bb4-4646-904f-e8fd6a170dff", "alertFirstOccurred": "2025-11-27T05:20:27.186180503Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:83, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.186180, _time:2025-11-27T05:20:27.186+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:31540, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "25ee9154-b579-441d-8d87-32410cb28fe6", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.186124431Z"}, "alertInfo": {"alertId": "25ee9154-b579-441d-8d87-32410cb28fe6", "alertFirstOccurred": "2025-11-27T05:20:27.186124431Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:84, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.186124, _time:2025-11-27T05:20:27.186+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:221911, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "fe23f461-e915-4b27-aede-21467bd2b54c", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.176264768Z"}, "alertInfo": {"alertId": "fe23f461-e915-4b27-aede-21467bd2b54c", "alertFirstOccurred": "2025-11-27T05:20:27.176264768Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:85, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.176264, _time:2025-11-27T05:20:27.176+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:11123, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "0e8c01bb-3851-4032-b01d-8bab2b59e7a0", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.176184526Z"}, "alertInfo": {"alertId": "0e8c01bb-3851-4032-b01d-8bab2b59e7a0", "alertFirstOccurred": "2025-11-27T05:20:27.176184526Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:86, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.176184, _time:2025-11-27T05:20:27.176+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:65981, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "5008d193-d108-44c0-a420-8b75d2c5f166", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.152867359Z"}, "alertInfo": {"alertId": "5008d193-d108-44c0-a420-8b75d2c5f166", "alertFirstOccurred": "2025-11-27T05:20:27.152867359Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:87, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.152867, _time:2025-11-27T05:20:27.152+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:141776, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "a435d8c0-d17a-4be0-a952-081ce83ea2f4", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.148085921Z"}, "alertInfo": {"alertId": "a435d8c0-d17a-4be0-a952-081ce83ea2f4", "alertFirstOccurred": "2025-11-27T05:20:27.148085921Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:88, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.148085, _time:2025-11-27T05:20:27.148+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:109496, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7f2cf865-1891-4cd6-bb6a-3b5d9d7f5aa2", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.122529982Z"}, "alertInfo": {"alertId": "7f2cf865-1891-4cd6-bb6a-3b5d9d7f5aa2", "alertFirstOccurred": "2025-11-27T05:20:27.122529982Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:89, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.122529, _time:2025-11-27T05:20:27.122+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:108723, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7e3f251b-e0a7-4efe-9e89-fd30756608d3", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.914301561Z"}, "alertInfo": {"alertId": "7e3f251b-e0a7-4efe-9e89-fd30756608d3", "alertFirstOccurred": "2025-11-27T05:20:26.914301561Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "8a3c16fa-6248-4d63-988a-b237783fd792", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:90, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.914301, _time:2025-11-27T05:20:26.914+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:7332, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "09883ec9-2d54-4dce-812e-dcf50780edff", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.913955884Z"}, "alertInfo": {"alertId": "09883ec9-2d54-4dce-812e-dcf50780edff", "alertFirstOccurred": "2025-11-27T05:20:26.913955884Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:91, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.913955, _time:2025-11-27T05:20:26.913+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:130594, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "98769e66-109b-4b78-82c4-2b1463967994", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.908690065Z"}, "alertInfo": {"alertId": "98769e66-109b-4b78-82c4-2b1463967994", "alertFirstOccurred": "2025-11-27T05:20:26.908690065Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:92, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.908690, _time:2025-11-27T05:20:26.908+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:113865, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "843c4c24-e382-4b48-bbe5-c4a08ca793b1", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.899526807Z"}, "alertInfo": {"alertId": "843c4c24-e382-4b48-bbe5-c4a08ca793b1", "alertFirstOccurred": "2025-11-27T05:20:26.899526807Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:93, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.899526, _time:2025-11-27T05:20:26.899+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:196321, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e325e073-699e-40c1-943c-058e992411b8", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.899464066Z"}, "alertInfo": {"alertId": "e325e073-699e-40c1-943c-058e992411b8", "alertFirstOccurred": "2025-11-27T05:20:26.899464066Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "8a3c16fa-6248-4d63-988a-b237783fd792", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:94, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.899464, _time:2025-11-27T05:20:26.899+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:147117, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "aadafe8a-6d29-4d3d-bbda-1591efe6c60e", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.895618889Z"}, "alertInfo": {"alertId": "aadafe8a-6d29-4d3d-bbda-1591efe6c60e", "alertFirstOccurred": "2025-11-27T05:20:26.895618889Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:95, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.895618, _time:2025-11-27T05:20:26.895+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:136081, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "9d8d2832-7fd3-497e-adc4-90d434d6c6c3", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.895574408Z"}, "alertInfo": {"alertId": "9d8d2832-7fd3-497e-adc4-90d434d6c6c3", "alertFirstOccurred": "2025-11-27T05:20:26.895574408Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "8a3c16fa-6248-4d63-988a-b237783fd792", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:96, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.895574, _time:2025-11-27T05:20:26.895+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:94286, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6e3a1327-1401-4009-b56e-a0958a00c4be", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.877379976Z"}, "alertInfo": {"alertId": "6e3a1327-1401-4009-b56e-a0958a00c4be", "alertFirstOccurred": "2025-11-27T05:20:26.877379976Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:97, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.877379, _time:2025-11-27T05:20:26.877+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:65107, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "4f1b7204-c57a-49cc-a5e3-0ab35acab87d", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.877328985Z"}, "alertInfo": {"alertId": "4f1b7204-c57a-49cc-a5e3-0ab35acab87d", "alertFirstOccurred": "2025-11-27T05:20:26.877328985Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "8a3c16fa-6248-4d63-988a-b237783fd792", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:98, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.877328, _time:2025-11-27T05:20:26.877+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:8422, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "0aaac4be-6e30-4e4d-ad6d-6a299a6bb42c", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.857516817Z"}, "alertInfo": {"alertId": "0aaac4be-6e30-4e4d-ad6d-6a299a6bb42c", "alertFirstOccurred": "2025-11-27T05:20:26.857516817Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "8a3c16fa-6248-4d63-988a-b237783fd792", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:99, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.857516, _time:2025-11-27T05:20:26.857+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6]] 05:25:27 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Current Splunk index contains any Network Violation: false and any Process Violation: true 05:25:27 | DEBUG | IntegrationsSplunkViolati | Helpers | Caught exception. Retrying in 15s (attempt 0 of 40): Condition not satisfied: hasNetworkViolation && hasProcessViolation | | false false 05:25:43 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | {"sid":"1764221143.9"} 05:25:43 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | New Search created: 1764221143.9 05:25:58 | DEBUG | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Violations currently indexed in Splunk: [[_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:223285, _indextime:1764221138, _raw:{"violationInfo": {"violationId": "71d5d75e-7f3d-5c32-bf57-b93d33b7f160", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:25:26.507328818Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:0, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.507328, _time:2025-11-27T05:25:26.507+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:223218, _indextime:1764221123, _raw:{"violationInfo": {"violationId": "b6a00dd2-821d-5ddb-a367-071ff87ed456", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:25:11.325022064Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:1, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.325022, _time:2025-11-27T05:25:11.325+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:223140, _indextime:1764221123, _raw:{"violationInfo": {"violationId": "50bd04d8-8fef-5cd2-9690-4118285af25a", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:25:11.170963357Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:2, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.170963, _time:2025-11-27T05:25:11.170+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:223071, _indextime:1764221123, _raw:{"violationInfo": {"violationId": "e13b643e-dc60-5293-b894-4d37d2bdff59", "violationMessage": "Unexpected network flow found in deployment. Source name: 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'. Destination name: 'Internal Entities'. Destination port: '443'. Protocol: 'L4_PROTOCOL_TCP'.", "violationType": "NETWORK_FLOW", "violationTime": "2025-11-27T05:25:10.043672835Z"}, "alertInfo": {"alertId": "140d24e3-af2d-4728-a98c-abaed574b987", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "1b74ffdd-8e67-444c-9814-1c23863c8ccb", "policyName": "Unauthorized Network Flow", "policyDescription": "This policy generates a violation for the network flows that fall outside baselines for which 'alert on anomalous violations' is set.", "policyRationale": "The network baseline is a list of flows that are allowed, and once it is frozen, any flow outside that is a concern.", "policyCategories": ["Anomalous Activity", "Zero Trust"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}, "networkFlowInfo": {"protocol": "L4_PROTOCOL_TCP", "source": {"name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "entityType": "DEPLOYMENT", "deploymentNamespace": "qa-splunk", "deploymentType": "Deployment"}, "destination": {"name": "Internal Entities", "entityType": "INTERNAL_ENTITIES", "port": 443}}}, _serial:3, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.043672, _time:2025-11-27T05:25:10.043+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:222993, _indextime:1764221113, _raw:{"violationInfo": {"violationId": "8c35fe5e-ba66-57fa-9f3c-fc6ee3bc78aa", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:25:00.995534011Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:4, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.995534, _time:2025-11-27T05:25:00.995+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:222915, _indextime:1764221103, _raw:{"violationInfo": {"violationId": "b5fa6c20-ebce-5830-b5ff-f0a24e83e023", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:24:50.825593952Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:5, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.825593, _time:2025-11-27T05:24:50.825+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:222837, _indextime:1764221093, _raw:{"violationInfo": {"violationId": "a24b5159-fd51-545e-9923-4928a432847f", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:24:40.650636060Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:6, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.650636, _time:2025-11-27T05:24:40.650+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68575, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7d85befd-a71c-533e-925c-d496b5daa4e8", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.162.206:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.162.206:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:24:00.395069198Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:7, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.395069, _time:2025-11-27T05:24:00.395+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:195045, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "dc19e2ff-e358-4ffb-ae64-d17a614fe23d", "violationMessage": "Binary '/usr/bin/curl' executed with arguments 'http://127.0.0.1:10248/ --max-time 2' under user ID 999", "violationType": "PROCESS_EVENT", "violationTime": "2025-11-27T05:24:00.230481435Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "podUid": "9e95252e-aa90-552a-a130-a62a90db7059", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "containerStartTime": "2025-11-27T05:22:41Z", "containerId": "3f15652cec44"}, "alertInfo": {"alertId": "e14e7a24-8cd8-49e3-b218-fdb8d5d0f355", "lifecycleStage": "RUNTIME"}, "processInfo": {"processViolationId": "dc19e2ff-e358-4ffb-ae64-d17a614fe23d", "processSignalId": "47964fd2-cb51-11f0-80f2-0a580a800220", "processCreationTime": "2025-11-27T05:24:00.230481435Z", "processName": "curl", "processArgs": "http://127.0.0.1:10248/ --max-time 2", "execFilePath": "/usr/bin/curl", "pid": 61829, "processUid": 999, "processGid": 999}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "86804b96-e87e-4eae-b56e-1718a8a55763", "policyName": "Process Targeting Cluster Kubelet Endpoint", "policyDescription": "Detects misuse of the healthz/kubelet API/heapster endpoint", "policyRationale": "A pod communicating to a Kubernetes API from via command line is highly irregular", "policyCategories": ["Kubernetes"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:8, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.230481, _time:2025-11-27T05:24:00.230+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68653, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "06585e7a-363e-5fcc-b8ff-449b8d8c3a39", "violationMessage": "Kubernetes API received exec 'curl http://127.0.0.1:10248/ --max-time 2' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl http://127.0.0.1:10248/ --max-time 2"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:24:00.209793622Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:9, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.209793, _time:2025-11-27T05:24:00.209+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179331, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "b988d7fc-9062-5f5a-8610-1db5cdbf7a05", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:59.575940477Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:10, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.575940, _time:2025-11-27T05:23:59.575+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179398, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "4a3c93ff-6abf-5616-813f-680c87fcb173", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:59.399722287Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:11, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.399722, _time:2025-11-27T05:23:59.399+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179465, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "65fa255f-f525-59e3-93ab-b4da16d58bbe", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:59.107988783Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:12, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.107988, _time:2025-11-27T05:23:59.107+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179532, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "0734996b-b3da-56db-a912-15296df6ae5f", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:55.952404645Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:13, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.952404, _time:2025-11-27T05:23:55.952+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179599, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "01a9e69c-1301-5156-acfe-01128abf3227", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:19.715598987Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:14, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.715598, _time:2025-11-27T05:23:19.715+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68729, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8aac1e45-91a0-5061-ae97-e79498ba5b49", "violationMessage": "Kubernetes API received exec 'sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:18.817495002Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:15, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.817495, _time:2025-11-27T05:23:18.817+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179666, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "0c3098e7-e18b-5960-8cd3-7b13597f7d09", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:17.887987642Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:16, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.887987, _time:2025-11-27T05:23:17.887+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179733, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e8ae6842-7cbe-50b1-9b0d-ff6665cf452f", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.889922658Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:17, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.889922, _time:2025-11-27T05:23:15.889+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68807, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "95203f9c-b77f-5ce2-8f22-b263990e2c5f", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; exit $e' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; exit $e"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.796700397Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:18, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.796700, _time:2025-11-27T05:23:15.796+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68891, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6ef50fd3-85ba-5573-8853-0eb9b8834b07", "violationMessage": "Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar'' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar'"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.704945449Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:19, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.704945, _time:2025-11-27T05:23:15.704+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68969, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8d9897f3-6552-5b2f-a039-f34b4a27f46d", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar' && echo $?' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar' && echo $?"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.501902042Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:20, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.501902, _time:2025-11-27T05:23:15.501+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:69049, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "b08690de-61fd-589a-8768-5ad154478670", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; exit $e' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; exit $e"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.398744176Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:21, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.398744, _time:2025-11-27T05:23:15.398+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:69133, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "a86c3734-d3cb-57ec-8ec5-a9dafd8d026e", "violationMessage": "Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar'' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar'"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.278181996Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:22, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.278181, _time:2025-11-27T05:23:15.278+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:69211, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "9a40206c-8b06-52dd-8b36-db5500bb69cb", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar' && echo $?' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar' && echo $?"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:14.976624896Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:23, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.976624, _time:2025-11-27T05:23:14.976+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179800, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "774f3bbb-35ba-5a2f-ac70-e139e79ee239", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:13.832243473Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:24, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.832243, _time:2025-11-27T05:23:13.832+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179867, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6d58e069-5661-58eb-9789-7323c035b653", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:03.754860569Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:25, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.754860, _time:2025-11-27T05:23:03.754+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:111096, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "80ec2b09-aede-4c61-b408-64009272a558", "violationMessage": "Container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' includes component 'microdnf' (version 3.8.0-2.el8.x86_64)\nContainer 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' includes component 'rpm' (version 4.14.3-26.el8.x86_64)", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.901477622Z"}, "alertInfo": {"alertId": "80ec2b09-aede-4c61-b408-64009272a558", "alertFirstOccurred": "2025-11-27T05:22:59.901477622Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "f95ff08d-130a-465a-a27e-32ed1fb05555", "policyName": "Red Hat Package Manager in Image", "policyDescription": "Alert on deployments with components of the Red Hat/Fedora/CentOS package management system.", "policyRationale": "Package managers make it easier for attackers to use compromised containers, since they can easily add software.", "policyCategories": ["Security Best Practices"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "LOW_SEVERITY", "policyVersion": "1.1"}}, _serial:26, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.901477, _time:2025-11-27T05:22:59.901+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:191492, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "dd23737f-ec6f-41eb-812a-25114376a1f2", "violationMessage": "Fixable CVE-2019-16942 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.1\nFixable CVE-2019-16943 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.1\nFixable CVE-2019-17531 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.1\nFixable CVE-2019-20330 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.2\nFixable CVE-2020-10650 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-10672 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-10673 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-10968 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-10969 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11111 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11112 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11113 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11619 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11620 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-13949 (CVSS 7.5) (severity Important) found in component 'hive' (version 3.1.3) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 4.0.0\nFixable CVE-2020-14060 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5\nFixable CVE-2020-14061 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5\nFixable CVE-2020-14062 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5\nFixable CVE-2020-14195 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5\nFixable CVE-2020-24616 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.6\nFixable CVE-2020-24750 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.6\nFixable CVE-2020-25649 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.7\nFixable CVE-2020-35490 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-35491 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-35728 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36179 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36180 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36181 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36182 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36183 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36184 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36185 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36186 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36187 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36188 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36189 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36518 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.12.6.1\nFixable CVE-2020-8840 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.3\nFixable CVE-2020-9546 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-9547 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-9548 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2021-20190 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.7\nFixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2019.6.16) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2022.12.7\nFixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2022.9.24) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2022.12.7\nFixable CVE-2022-3171 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 3.16.3\nFixable CVE-2022-42003 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.12.7.1\nFixable CVE-2022-42004 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.12.7.1\nFixable CVE-2023-0341 (CVSS 7.8) (severity Important) found in component 'editorconfig' (version 0.12.3) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0.12.6\nFixable CVE-2023-2976 (CVSS 7.1) (severity Important) found in component 'guava' (version 11.0.2) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 32.0.0\nFixable CVE-2023-37920 (CVSS 9.8) (severity Critical) found in component 'certifi' (version 2019.6.16) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2023.7.22\nFixable CVE-2023-38325 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 41.0.2\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.12) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.26.17\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.6) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.26.17\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 2.0.2) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.0.6\nFixable CVE-2023-49083 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 41.0.6\nFixable CVE-2023-50782 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 42.0.0\nFixable CVE-2024-26130 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 42.0.4\nFixable CVE-2024-7254 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 3.25.5\nFixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.10.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.15.2\nFixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.11.2) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.15.2\nFixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 47.1.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 78.1.1\nFixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 67.8.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 78.1.1\nFixable CVE-2025-47436 (CVSS 9.8) (severity Critical) found in component 'orc' (version 1.5.8) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.8.9\nFixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-25.el8_8\nFixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-25.el8_8\nFixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.1\nFixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.1\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5837 (CVSS 7.5) (severity Important) found in component 'libnghttp2' (version 1.33.0-3.el8_2.1.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.33.0-5.el8_8\nFixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.2\nFixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.2\nFixable RHSA-2024:10379 (CVSS 7.4) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.3.1-36.el8_10\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-62.el8_10\nFixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-62.el8_10\nFixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'platform-python-setuptools' (version 39.2.0-7.el8.noarch) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:39.2.0-8.el8_10\nFixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'python3-setuptools-wheel' (version 39.2.0-7.el8.noarch) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:39.2.0-8.el8_10\nFixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-30.el8_10\nFixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-30.el8_10\nFixable RHSA-2025:10027 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.3.1-37.el8_10\nFixable RHSA-2025:10110 (CVSS 7) (severity Important) found in component 'sudo' (version 1.8.29-10.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.9.5p2-1.el8_10.1\nFixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-70.el8_10\nFixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-70.el8_10\nFixable RHSA-2025:10698 (CVSS 9.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.9.7-21.el8_10.1\nFixable RHSA-2025:12010 (CVSS 7.7) (severity Important) found in component 'sqlite-libs' (version 3.26.0-17.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.26.0-20.el8_10\nFixable RHSA-2025:12450 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.9.7-21.el8_10.2\nFixable RHSA-2025:14135 (CVSS 7.3) (severity Important) found in component 'libarchive' (version 3.3.3-5.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.3.3-6.el8_10\nFixable RHSA-2025:14557 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.3.1-38.el8_10\nFixable RHSA-2025:21776 (CVSS 5.3) (severity Important) found in component 'expat' (version 2.2.5-11.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.5.0-1.el8_10\nFixable RHSA-2025:2686 (CVSS 8.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.9.7-19.el8_10", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.900774486Z"}, "alertInfo": {"alertId": "dd23737f-ec6f-41eb-812a-25114376a1f2", "alertFirstOccurred": "2025-11-27T05:22:59.900774486Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "a919ccaf-6b43-4160-ac5d-a405e1440a41", "policyName": "Fixable Severity at least Important", "policyDescription": "Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important", "policyRationale": "Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s).", "policyCategories": ["Vulnerability Management"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:27, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.900774, _time:2025-11-27T05:22:59.900+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:102977, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "77b1132f-4fe2-4347-a5af-3b7241e9c3d6", "violationMessage": "CPU request set to 0 cores for container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'\nMemory limit set to 0 MB for container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.893566523Z"}, "alertInfo": {"alertId": "77b1132f-4fe2-4347-a5af-3b7241e9c3d6", "alertFirstOccurred": "2025-11-27T05:22:59.893566523Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "886c3c94-3a6a-4f2b-82fc-d6bf5a310840", "policyName": "No CPU request or memory limit specified", "policyDescription": "Alert on deployments that have containers without CPU request or memory limit", "policyRationale": "A container without a specified CPU request may be starved for CPU time, while a container without a specified memory limit may cause the host to become over-provisioned.", "policyCategories": ["DevOps Best Practices", "Docker CIS"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:28, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.893566, _time:2025-11-27T05:22:59.893+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:133245, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "9b208c57-298c-4e60-9010-46129f88e4df", "violationMessage": "Deployment mounts the service account tokens.\nNamespace has name 'qa-splunk'\nService Account is set to 'default'", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.893471221Z"}, "alertInfo": {"alertId": "9b208c57-298c-4e60-9010-46129f88e4df", "alertFirstOccurred": "2025-11-27T05:22:59.893471221Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "fb8f8732-c31d-496b-8fb1-d5abe6056e27", "policyName": "Pod Service Account Token Automatically Mounted", "policyDescription": "Protect pod default service account tokens from compromise by minimizing the mounting of the default service account token to only those pods whose application requires interaction with the Kubernetes API.", "policyRationale": "By default, Kubernetes automatically provisions a service account for each pod and mounts the secret at runtime. This service account is not typically used. If this pod is compromised and the compromised user has access to the service account, the service account could be used to escalate privileges within the cluster. To reduce the likelihood of privilege escalation this service account should not be mounted by default unless the pod requires direct access to the Kubernetes API as part of the pods functionality.", "policyCategories": ["Privileges", "Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:29, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.893471, _time:2025-11-27T05:22:59.893+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:198280, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e548ab37-cb13-4384-b4f9-be4a1f478da6", "violationMessage": "Environment variable 'SPLUNK_PASSWORD' is present in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.893416399Z"}, "alertInfo": {"alertId": "e548ab37-cb13-4384-b4f9-be4a1f478da6", "alertFirstOccurred": "2025-11-27T05:22:59.893416399Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "f4996314-c3d7-4553-803b-b24ce7febe48", "policyName": "Environment Variable Contains Secret", "policyDescription": "Alert on deployments with environment variables that contain 'SECRET'", "policyRationale": "Using secrets in environment variables may allow inspection into your secrets from the host or even through the orchestrator UI.", "policyCategories": ["Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:30, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.893416, _time:2025-11-27T05:22:59.893+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:219250, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "fa69e6ff-bcab-4f34-b50b-e084b1c11f8c", "violationMessage": "Container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' allows privilege escalation", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.892935189Z"}, "alertInfo": {"alertId": "fa69e6ff-bcab-4f34-b50b-e084b1c11f8c", "alertFirstOccurred": "2025-11-27T05:22:59.892935189Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "16c95922-08c4-41b6-a721-dc4b2a806632", "policyName": "Container with privilege escalation allowed", "policyDescription": "Alerts if a deployment has containers with allowPrivilegeEscalation set to true in its security context.", "policyRationale": "A container process can run with more privileges than its parent process if the container's security context has the boolean setting allowPrivilegeEscalation enabled. In Kubernetes pods, this setting is true by default. Set the value to false if the pod is to run as a non-root user.", "policyCategories": ["Privileges", "Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:31, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.892935, _time:2025-11-27T05:22:59.892+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:77612, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "5d2a43b4-2797-4944-bce4-ecfc87d1724c", "violationMessage": "Container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' has image created at 2023-06-03 01:21:18 (UTC)", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.892911488Z"}, "alertInfo": {"alertId": "5d2a43b4-2797-4944-bce4-ecfc87d1724c", "alertFirstOccurred": "2025-11-27T05:22:59.892911488Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "2db9a279-2aec-4618-a85d-7f1bdf4911b1", "policyName": "90-Day Image Age", "policyDescription": "Alert on deployments with images that haven't been updated in 90 days", "policyRationale": "Base images are updated frequently with bug fixes and vulnerability patches. Image age exceeding 90 days may indicate a higher risk of vulnerabilities existing in the image.", "policyCategories": ["DevOps Best Practices", "Security Best Practices", "Supply Chain Security"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "LOW_SEVERITY", "policyVersion": "1.1"}}, _serial:32, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.892911, _time:2025-11-27T05:22:59.892+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179934, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "60ab0342-7087-5278-a1c5-93033f99dd2a", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:22:53.693516480Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:33, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.693516, _time:2025-11-27T05:22:53.693+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:180001, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "fe0ffa45-ea88-59ea-9bc5-2dcd01dd4ea1", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:22:43.622314637Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:34, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.622314, _time:2025-11-27T05:22:43.622+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:123701, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8fdaa510-641f-4ae1-b241-cdb863c1811d", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.497728555Z"}, "alertInfo": {"alertId": "8fdaa510-641f-4ae1-b241-cdb863c1811d", "alertFirstOccurred": "2025-11-27T05:20:28.497728555Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:35, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.497728, _time:2025-11-27T05:20:28.497+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:202279, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "ea4473cc-cf05-4067-81e7-bc4d8cbb5b43", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.410415400Z"}, "alertInfo": {"alertId": "ea4473cc-cf05-4067-81e7-bc4d8cbb5b43", "alertFirstOccurred": "2025-11-27T05:20:28.410415400Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:36, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.410415, _time:2025-11-27T05:20:28.410+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:202500, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "ea7c47f2-50ef-4ca6-8e6b-b062aaadee08", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.222047488Z"}, "alertInfo": {"alertId": "ea7c47f2-50ef-4ca6-8e6b-b062aaadee08", "alertFirstOccurred": "2025-11-27T05:20:28.222047488Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:37, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.222047, _time:2025-11-27T05:20:28.222+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:202612, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "eaa7a39a-c976-402f-9a60-c316789701b6", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.221979587Z"}, "alertInfo": {"alertId": "eaa7a39a-c976-402f-9a60-c316789701b6", "alertFirstOccurred": "2025-11-27T05:20:28.221979587Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:38, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.221979, _time:2025-11-27T05:20:28.221+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:11883, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "1023c391-7d30-44b7-907b-aa2c0ddd96d1", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.221585658Z"}, "alertInfo": {"alertId": "1023c391-7d30-44b7-907b-aa2c0ddd96d1", "alertFirstOccurred": "2025-11-27T05:20:28.221585658Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:39, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.221585, _time:2025-11-27T05:20:28.221+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:153918, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "b390365d-0f9e-4d2d-aa9d-bff80b657fc8", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.217622628Z"}, "alertInfo": {"alertId": "b390365d-0f9e-4d2d-aa9d-bff80b657fc8", "alertFirstOccurred": "2025-11-27T05:20:28.217622628Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:40, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.217622, _time:2025-11-27T05:20:28.217+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:86006, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6766b714-2d5d-4e9b-9d6c-5dd2c15b85ac", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.149673431Z"}, "alertInfo": {"alertId": "6766b714-2d5d-4e9b-9d6c-5dd2c15b85ac", "alertFirstOccurred": "2025-11-27T05:20:28.149673431Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:41, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.149673, _time:2025-11-27T05:20:28.149+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:23239, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "1bacde3c-d6a8-40af-a188-d7f5ea3338dc", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.103362713Z"}, "alertInfo": {"alertId": "1bacde3c-d6a8-40af-a188-d7f5ea3338dc", "alertFirstOccurred": "2025-11-27T05:20:28.103362713Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:42, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.103362, _time:2025-11-27T05:20:28.103+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:201736, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e9b3e6e7-5652-4887-bf0a-f5857c9c62b8", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.103281951Z"}, "alertInfo": {"alertId": "e9b3e6e7-5652-4887-bf0a-f5857c9c62b8", "alertFirstOccurred": "2025-11-27T05:20:28.103281951Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:43, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.103281, _time:2025-11-27T05:20:28.103+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:150235, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "ae424497-b7bd-49be-a236-e54d00039253", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.102040863Z"}, "alertInfo": {"alertId": "ae424497-b7bd-49be-a236-e54d00039253", "alertFirstOccurred": "2025-11-27T05:20:28.102040863Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:44, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.102040, _time:2025-11-27T05:20:28.102+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:62723, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "4bec9b1e-265c-45d6-8711-e36df4fc11e9", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.097373318Z"}, "alertInfo": {"alertId": "4bec9b1e-265c-45d6-8711-e36df4fc11e9", "alertFirstOccurred": "2025-11-27T05:20:28.097373318Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:45, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.097373, _time:2025-11-27T05:20:28.097+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:199146, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e7488ffc-730e-4ce4-ade4-b548070b020e", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.095140477Z"}, "alertInfo": {"alertId": "e7488ffc-730e-4ce4-ade4-b548070b020e", "alertFirstOccurred": "2025-11-27T05:20:28.095140477Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:46, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.095140, _time:2025-11-27T05:20:28.095+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:60736, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "49e6d51c-ae4f-4fa1-8c89-7ea82cf9606b", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.094709837Z"}, "alertInfo": {"alertId": "49e6d51c-ae4f-4fa1-8c89-7ea82cf9606b", "alertFirstOccurred": "2025-11-27T05:20:28.094709837Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:47, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.094709, _time:2025-11-27T05:20:28.094+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:9325, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "0c6ae6ab-d255-41d6-8113-bc5a76ef7a3b", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.074049610Z"}, "alertInfo": {"alertId": "0c6ae6ab-d255-41d6-8113-bc5a76ef7a3b", "alertFirstOccurred": "2025-11-27T05:20:28.074049610Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:48, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.074049, _time:2025-11-27T05:20:28.074+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:93705, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6dcc405d-62ce-4026-9d14-349d134279f3", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.056405351Z"}, "alertInfo": {"alertId": "6dcc405d-62ce-4026-9d14-349d134279f3", "alertFirstOccurred": "2025-11-27T05:20:28.056405351Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:49, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.056405, _time:2025-11-27T05:20:28.056+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:107408, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7cb256e6-cd38-4759-b1d0-2789b59f385c", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.055693505Z"}, "alertInfo": {"alertId": "7cb256e6-cd38-4759-b1d0-2789b59f385c", "alertFirstOccurred": "2025-11-27T05:20:28.055693505Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:50, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.055693, _time:2025-11-27T05:20:28.055+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:105152, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "79da2009-dc25-4d01-a55c-b0aa61c1091e", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.894311344Z"}, "alertInfo": {"alertId": "79da2009-dc25-4d01-a55c-b0aa61c1091e", "alertFirstOccurred": "2025-11-27T05:20:27.894311344Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:51, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.894311, _time:2025-11-27T05:20:27.894+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:138604, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "a1191d6f-3b2a-4d35-9029-6fc39b46ed88", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.894241412Z"}, "alertInfo": {"alertId": "a1191d6f-3b2a-4d35-9029-6fc39b46ed88", "alertFirstOccurred": "2025-11-27T05:20:27.894241412Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:52, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.894241, _time:2025-11-27T05:20:27.894+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:46860, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "37ff2b27-e1b2-48c6-af71-5a1039500137", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.893683119Z"}, "alertInfo": {"alertId": "37ff2b27-e1b2-48c6-af71-5a1039500137", "alertFirstOccurred": "2025-11-27T05:20:27.893683119Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:53, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.893683, _time:2025-11-27T05:20:27.893+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:54032, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "41cf2359-0e3e-4809-89b4-7ddafea39dd8", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.889313970Z"}, "alertInfo": {"alertId": "41cf2359-0e3e-4809-89b4-7ddafea39dd8", "alertFirstOccurred": "2025-11-27T05:20:27.889313970Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:54, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.889313, _time:2025-11-27T05:20:27.889+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:29926, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "244026f7-62ac-468a-af0c-c967af27d440", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.861982452Z"}, "alertInfo": {"alertId": "244026f7-62ac-468a-af0c-c967af27d440", "alertFirstOccurred": "2025-11-27T05:20:27.861982452Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:55, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.861982, _time:2025-11-27T05:20:27.861+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:219749, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "fadc9c7e-6147-466f-8338-bc41171a22a3", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.861767787Z"}, "alertInfo": {"alertId": "fadc9c7e-6147-466f-8338-bc41171a22a3", "alertFirstOccurred": "2025-11-27T05:20:27.861767787Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:56, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.861767, _time:2025-11-27T05:20:27.861+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:60320, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "494110d4-9cfb-4f1a-8fc7-286ce1ec6aaa", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.813848443Z"}, "alertInfo": {"alertId": "494110d4-9cfb-4f1a-8fc7-286ce1ec6aaa", "alertFirstOccurred": "2025-11-27T05:20:27.813848443Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:57, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.813848, _time:2025-11-27T05:20:27.813+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:94102, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6e2b7a51-344f-4e40-8696-05a3caa9d8f9", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.812954333Z"}, "alertInfo": {"alertId": "6e2b7a51-344f-4e40-8696-05a3caa9d8f9", "alertFirstOccurred": "2025-11-27T05:20:27.812954333Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:58, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.812954, _time:2025-11-27T05:20:27.812+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:54224, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "4219ecc4-0657-4f3f-8e65-b1e02c73dc60", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.785467881Z"}, "alertInfo": {"alertId": "4219ecc4-0657-4f3f-8e65-b1e02c73dc60", "alertFirstOccurred": "2025-11-27T05:20:27.785467881Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:59, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.785467, _time:2025-11-27T05:20:27.785+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:170272, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "c7d2c760-f15c-4a5d-9036-bc5344476ddb", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.777545122Z"}, "alertInfo": {"alertId": "c7d2c760-f15c-4a5d-9036-bc5344476ddb", "alertFirstOccurred": "2025-11-27T05:20:27.777545122Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:60, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.777545, _time:2025-11-27T05:20:27.777+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:6379, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "08243a3a-6212-413f-9e34-280468ebc434", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.772035977Z"}, "alertInfo": {"alertId": "08243a3a-6212-413f-9e34-280468ebc434", "alertFirstOccurred": "2025-11-27T05:20:27.772035977Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:61, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.772035, _time:2025-11-27T05:20:27.772+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:41097, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "30ee1ed7-f4c8-4b55-8768-456ab0cf51c1", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.765400647Z"}, "alertInfo": {"alertId": "30ee1ed7-f4c8-4b55-8768-456ab0cf51c1", "alertFirstOccurred": "2025-11-27T05:20:27.765400647Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:62, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.765400, _time:2025-11-27T05:20:27.765+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:61879, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "4a99896c-f19d-4586-b6eb-fe37dbb8323a", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.764980527Z"}, "alertInfo": {"alertId": "4a99896c-f19d-4586-b6eb-fe37dbb8323a", "alertFirstOccurred": "2025-11-27T05:20:27.764980527Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:63, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.764980, _time:2025-11-27T05:20:27.764+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:207918, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "f2934833-88ff-433a-b360-f53f5d50f65e", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.743456920Z"}, "alertInfo": {"alertId": "f2934833-88ff-433a-b360-f53f5d50f65e", "alertFirstOccurred": "2025-11-27T05:20:27.743456920Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:64, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.743456, _time:2025-11-27T05:20:27.743+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:119149, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8af6f2d6-b3cf-4941-87a7-1dd3397c6a18", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.743024881Z"}, "alertInfo": {"alertId": "8af6f2d6-b3cf-4941-87a7-1dd3397c6a18", "alertFirstOccurred": "2025-11-27T05:20:27.743024881Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:65, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.743024, _time:2025-11-27T05:20:27.743+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:27020, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "20d8221a-bef7-48ff-bc01-a7c1ace83f93", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.580147246Z"}, "alertInfo": {"alertId": "20d8221a-bef7-48ff-bc01-a7c1ace83f93", "alertFirstOccurred": "2025-11-27T05:20:27.580147246Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:66, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.580147, _time:2025-11-27T05:20:27.580+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:31597, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "25f8dd53-fbd5-4361-9cbb-54348ec56100", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.580129875Z"}, "alertInfo": {"alertId": "25f8dd53-fbd5-4361-9cbb-54348ec56100", "alertFirstOccurred": "2025-11-27T05:20:27.580129875Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:67, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.580129, _time:2025-11-27T05:20:27.580+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:199681, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e7eb3470-3de0-41ca-b800-985459331b68", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.580035473Z"}, "alertInfo": {"alertId": "e7eb3470-3de0-41ca-b800-985459331b68", "alertFirstOccurred": "2025-11-27T05:20:27.580035473Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:68, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.580035, _time:2025-11-27T05:20:27.580+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:123263, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8efbf4ef-be56-49f0-b5e6-45ac3db4acdd", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.573188538Z"}, "alertInfo": {"alertId": "8efbf4ef-be56-49f0-b5e6-45ac3db4acdd", "alertFirstOccurred": "2025-11-27T05:20:27.573188538Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:69, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.573188, _time:2025-11-27T05:20:27.573+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:113325, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "83750eb8-eccf-40ab-92a8-3f55d1c42a76", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.573171338Z"}, "alertInfo": {"alertId": "83750eb8-eccf-40ab-92a8-3f55d1c42a76", "alertFirstOccurred": "2025-11-27T05:20:27.573171338Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:70, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.573171, _time:2025-11-27T05:20:27.573+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:103037, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "77e0beab-e45c-42c9-b9ad-0adb907c1166", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.515850381Z"}, "alertInfo": {"alertId": "77e0beab-e45c-42c9-b9ad-0adb907c1166", "alertFirstOccurred": "2025-11-27T05:20:27.515850381Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:71, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.515850, _time:2025-11-27T05:20:27.515+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:127228, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "941488d0-4008-40cc-95ed-bb2661e31a27", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.515807530Z"}, "alertInfo": {"alertId": "941488d0-4008-40cc-95ed-bb2661e31a27", "alertFirstOccurred": "2025-11-27T05:20:27.515807530Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:72, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.515807, _time:2025-11-27T05:20:27.515+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:209171, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "f40e1cb6-cefa-4b40-b4d5-28655c84383f", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.510527681Z"}, "alertInfo": {"alertId": "f40e1cb6-cefa-4b40-b4d5-28655c84383f", "alertFirstOccurred": "2025-11-27T05:20:27.510527681Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:73, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.510527, _time:2025-11-27T05:20:27.510+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:67063, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "5111664b-418a-4ec7-8288-6ceb49c1d7c3", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.477956054Z"}, "alertInfo": {"alertId": "5111664b-418a-4ec7-8288-6ceb49c1d7c3", "alertFirstOccurred": "2025-11-27T05:20:27.477956054Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:74, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.477956, _time:2025-11-27T05:20:27.477+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:40654, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "30378015-ac84-4f9f-8a09-71e220f10dd0", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.457541972Z"}, "alertInfo": {"alertId": "30378015-ac84-4f9f-8a09-71e220f10dd0", "alertFirstOccurred": "2025-11-27T05:20:27.457541972Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:75, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.457541, _time:2025-11-27T05:20:27.457+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:211943, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "f621e68d-ec8e-4f4e-8749-5afdf9ed9471", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.456544579Z"}, "alertInfo": {"alertId": "f621e68d-ec8e-4f4e-8749-5afdf9ed9471", "alertFirstOccurred": "2025-11-27T05:20:27.456544579Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:76, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.456544, _time:2025-11-27T05:20:27.456+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:193169, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "de42bd44-525a-4e3e-9f1b-ccece654be72", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.456201972Z"}, "alertInfo": {"alertId": "de42bd44-525a-4e3e-9f1b-ccece654be72", "alertFirstOccurred": "2025-11-27T05:20:27.456201972Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:77, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.456201, _time:2025-11-27T05:20:27.456+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:95999, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6fbeb7d5-1081-407c-87ce-e4318ba009d2", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.455134907Z"}, "alertInfo": {"alertId": "6fbeb7d5-1081-407c-87ce-e4318ba009d2", "alertFirstOccurred": "2025-11-27T05:20:27.455134907Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:78, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.455134, _time:2025-11-27T05:20:27.455+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:46539, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "37a14544-fd7b-4640-b435-d17438fb1031", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.451637458Z"}, "alertInfo": {"alertId": "37a14544-fd7b-4640-b435-d17438fb1031", "alertFirstOccurred": "2025-11-27T05:20:27.451637458Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:79, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.451637, _time:2025-11-27T05:20:27.451+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:181487, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "d4e49f6d-4ab7-45d7-8494-3411c0536f92", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.441735574Z"}, "alertInfo": {"alertId": "d4e49f6d-4ab7-45d7-8494-3411c0536f92", "alertFirstOccurred": "2025-11-27T05:20:27.441735574Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:80, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.441735, _time:2025-11-27T05:20:27.441+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:200637, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e89a474a-d0ab-4f29-84a3-637a629e2ff1", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.438323097Z"}, "alertInfo": {"alertId": "e89a474a-d0ab-4f29-84a3-637a629e2ff1", "alertFirstOccurred": "2025-11-27T05:20:27.438323097Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:81, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.438323, _time:2025-11-27T05:20:27.438+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:23288, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "1bb92401-9b77-4bde-8581-47274cc62ee1", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.210865101Z"}, "alertInfo": {"alertId": "1bb92401-9b77-4bde-8581-47274cc62ee1", "alertFirstOccurred": "2025-11-27T05:20:27.210865101Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:82, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.210865, _time:2025-11-27T05:20:27.210+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:132008, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "9a751e9a-8ad6-409e-899a-553f5522034c", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.210687497Z"}, "alertInfo": {"alertId": "9a751e9a-8ad6-409e-899a-553f5522034c", "alertFirstOccurred": "2025-11-27T05:20:27.210687497Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:83, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.210687, _time:2025-11-27T05:20:27.210+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:53109, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "3fedb1d2-fee3-4c8d-aeb9-fc82f3d81e1b", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.210666506Z"}, "alertInfo": {"alertId": "3fedb1d2-fee3-4c8d-aeb9-fc82f3d81e1b", "alertFirstOccurred": "2025-11-27T05:20:27.210666506Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:84, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.210666, _time:2025-11-27T05:20:27.210+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:147358, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "aaed267e-b60e-4ec5-b6fe-f3a55c42ac9d", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.195867492Z"}, "alertInfo": {"alertId": "aaed267e-b60e-4ec5-b6fe-f3a55c42ac9d", "alertFirstOccurred": "2025-11-27T05:20:27.195867492Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:85, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.195867, _time:2025-11-27T05:20:27.195+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:111536, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "81a775e4-8360-4aec-a30b-e9610cd92ddd", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.187610255Z"}, "alertInfo": {"alertId": "81a775e4-8360-4aec-a30b-e9610cd92ddd", "alertFirstOccurred": "2025-11-27T05:20:27.187610255Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:86, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.187610, _time:2025-11-27T05:20:27.187+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:97129, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7135c7d1-2f72-4822-acd0-5c70843d767d", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.187382960Z"}, "alertInfo": {"alertId": "7135c7d1-2f72-4822-acd0-5c70843d767d", "alertFirstOccurred": "2025-11-27T05:20:27.187382960Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:87, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.187382, _time:2025-11-27T05:20:27.187+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:51340, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "3db5046a-2bb4-4646-904f-e8fd6a170dff", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.186180503Z"}, "alertInfo": {"alertId": "3db5046a-2bb4-4646-904f-e8fd6a170dff", "alertFirstOccurred": "2025-11-27T05:20:27.186180503Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:88, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.186180, _time:2025-11-27T05:20:27.186+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:31540, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "25ee9154-b579-441d-8d87-32410cb28fe6", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.186124431Z"}, "alertInfo": {"alertId": "25ee9154-b579-441d-8d87-32410cb28fe6", "alertFirstOccurred": "2025-11-27T05:20:27.186124431Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:89, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.186124, _time:2025-11-27T05:20:27.186+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:221911, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "fe23f461-e915-4b27-aede-21467bd2b54c", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.176264768Z"}, "alertInfo": {"alertId": "fe23f461-e915-4b27-aede-21467bd2b54c", "alertFirstOccurred": "2025-11-27T05:20:27.176264768Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:90, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.176264, _time:2025-11-27T05:20:27.176+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:11123, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "0e8c01bb-3851-4032-b01d-8bab2b59e7a0", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.176184526Z"}, "alertInfo": {"alertId": "0e8c01bb-3851-4032-b01d-8bab2b59e7a0", "alertFirstOccurred": "2025-11-27T05:20:27.176184526Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:91, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.176184, _time:2025-11-27T05:20:27.176+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:65981, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "5008d193-d108-44c0-a420-8b75d2c5f166", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.152867359Z"}, "alertInfo": {"alertId": "5008d193-d108-44c0-a420-8b75d2c5f166", "alertFirstOccurred": "2025-11-27T05:20:27.152867359Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:92, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.152867, _time:2025-11-27T05:20:27.152+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:141776, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "a435d8c0-d17a-4be0-a952-081ce83ea2f4", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.148085921Z"}, "alertInfo": {"alertId": "a435d8c0-d17a-4be0-a952-081ce83ea2f4", "alertFirstOccurred": "2025-11-27T05:20:27.148085921Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:93, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.148085, _time:2025-11-27T05:20:27.148+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:109496, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7f2cf865-1891-4cd6-bb6a-3b5d9d7f5aa2", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.122529982Z"}, "alertInfo": {"alertId": "7f2cf865-1891-4cd6-bb6a-3b5d9d7f5aa2", "alertFirstOccurred": "2025-11-27T05:20:27.122529982Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:94, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.122529, _time:2025-11-27T05:20:27.122+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:108723, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7e3f251b-e0a7-4efe-9e89-fd30756608d3", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.914301561Z"}, "alertInfo": {"alertId": "7e3f251b-e0a7-4efe-9e89-fd30756608d3", "alertFirstOccurred": "2025-11-27T05:20:26.914301561Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "8a3c16fa-6248-4d63-988a-b237783fd792", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:95, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.914301, _time:2025-11-27T05:20:26.914+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:7332, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "09883ec9-2d54-4dce-812e-dcf50780edff", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.913955884Z"}, "alertInfo": {"alertId": "09883ec9-2d54-4dce-812e-dcf50780edff", "alertFirstOccurred": "2025-11-27T05:20:26.913955884Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:96, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.913955, _time:2025-11-27T05:20:26.913+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:130594, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "98769e66-109b-4b78-82c4-2b1463967994", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.908690065Z"}, "alertInfo": {"alertId": "98769e66-109b-4b78-82c4-2b1463967994", "alertFirstOccurred": "2025-11-27T05:20:26.908690065Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:97, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.908690, _time:2025-11-27T05:20:26.908+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:113865, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "843c4c24-e382-4b48-bbe5-c4a08ca793b1", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.899526807Z"}, "alertInfo": {"alertId": "843c4c24-e382-4b48-bbe5-c4a08ca793b1", "alertFirstOccurred": "2025-11-27T05:20:26.899526807Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:98, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.899526, _time:2025-11-27T05:20:26.899+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6], [_bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:196321, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e325e073-699e-40c1-943c-058e992411b8", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.899464066Z"}, "alertInfo": {"alertId": "e325e073-699e-40c1-943c-058e992411b8", "alertFirstOccurred": "2025-11-27T05:20:26.899464066Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "8a3c16fa-6248-4d63-988a-b237783fd792", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:99, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.899464, _time:2025-11-27T05:20:26.899+00:00, host:$decideOnStartup, index:main, linecount:1, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, splunk_server:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6]] 05:25:58 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Current Splunk index contains any Network Violation: true and any Process Violation: true 05:25:58 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Starting conversion of ACS violations to Splunk alerts 05:25:58 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | {"sid":"1764221158.10"} 05:25:58 | DEBUG | IntegrationsSplunkViolati | SplunkUtil | New Search created: 1764221158.10 05:26:14 | DEBUG | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Alerts currently indexed in Splunk: [[_time:2025-11-27T05:25:42.901+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:cb496b1b-54c1-5988-b646-af1222a6bc72, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:223352, _indextime:1764221153, _raw:{"violationInfo": {"violationId": "cb496b1b-54c1-5988-b646-af1222a6bc72", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:25:42.901045515Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:0, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.901045], [_time:2025-11-27T05:25:26.507+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:71d5d75e-7f3d-5c32-bf57-b93d33b7f160, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:223285, _indextime:1764221138, _raw:{"violationInfo": {"violationId": "71d5d75e-7f3d-5c32-bf57-b93d33b7f160", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:25:26.507328818Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:1, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.507328], [_time:2025-11-27T05:25:11.325+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:b6a00dd2-821d-5ddb-a367-071ff87ed456, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:223218, _indextime:1764221123, _raw:{"violationInfo": {"violationId": "b6a00dd2-821d-5ddb-a367-071ff87ed456", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:25:11.325022064Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:2, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.325022], [_time:2025-11-27T05:25:11.170+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:50bd04d8-8fef-5cd2-9690-4118285af25a, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:223140, _indextime:1764221123, _raw:{"violationInfo": {"violationId": "50bd04d8-8fef-5cd2-9690-4118285af25a", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:25:11.170963357Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:3, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.170963], [_time:2025-11-27T05:25:10.043+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Unexpected network flow found in deployment. Source name: 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'. Destination name: 'Internal Entities'. Destination port: '443'. Protocol: 'L4_PROTOCOL_TCP'., dest_type:INTERNAL_ENTITIES, id:e13b643e-dc60-5293-b894-4d37d2bdff59, signature:This policy generates a violation for the network flows that fall outside baselines for which 'alert on anomalous violations' is set., src_type:Deployment, app:stackrox, dest:Internal Entities, severity:high, signature_id:Unauthorized Network Flow, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:223071, _indextime:1764221123, _raw:{"violationInfo": {"violationId": "e13b643e-dc60-5293-b894-4d37d2bdff59", "violationMessage": "Unexpected network flow found in deployment. Source name: 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'. Destination name: 'Internal Entities'. Destination port: '443'. Protocol: 'L4_PROTOCOL_TCP'.", "violationType": "NETWORK_FLOW", "violationTime": "2025-11-27T05:25:10.043672835Z"}, "alertInfo": {"alertId": "140d24e3-af2d-4728-a98c-abaed574b987", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "1b74ffdd-8e67-444c-9814-1c23863c8ccb", "policyName": "Unauthorized Network Flow", "policyDescription": "This policy generates a violation for the network flows that fall outside baselines for which 'alert on anomalous violations' is set.", "policyRationale": "The network baseline is a list of flows that are allowed, and once it is frozen, any flow outside that is a concern.", "policyCategories": ["Anomalous Activity", "Zero Trust"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}, "networkFlowInfo": {"protocol": "L4_PROTOCOL_TCP", "source": {"name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "entityType": "DEPLOYMENT", "deploymentNamespace": "qa-splunk", "deploymentType": "Deployment"}, "destination": {"name": "Internal Entities", "entityType": "INTERNAL_ENTITIES", "port": 443}}}, _serial:4, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.043672], [_time:2025-11-27T05:25:00.995+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:8c35fe5e-ba66-57fa-9f3c-fc6ee3bc78aa, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:222993, _indextime:1764221113, _raw:{"violationInfo": {"violationId": "8c35fe5e-ba66-57fa-9f3c-fc6ee3bc78aa", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:25:00.995534011Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:5, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.995534], [_time:2025-11-27T05:24:50.825+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:b5fa6c20-ebce-5830-b5ff-f0a24e83e023, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:222915, _indextime:1764221103, _raw:{"violationInfo": {"violationId": "b5fa6c20-ebce-5830-b5ff-f0a24e83e023", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:24:50.825593952Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:6, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.825593], [_time:2025-11-27T05:24:40.650+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:a24b5159-fd51-545e-9923-4928a432847f, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:222837, _indextime:1764221093, _raw:{"violationInfo": {"violationId": "a24b5159-fd51-545e-9923-4928a432847f", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.0.1:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:24:40.650636060Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:7, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.650636], [_time:2025-11-27T05:24:00.395+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.162.206:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:7d85befd-a71c-533e-925c-d496b5daa4e8, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68575, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7d85befd-a71c-533e-925c-d496b5daa4e8", "violationMessage": "Kubernetes API received exec 'curl --insecure --head --request GET --max-time 5 https://172.30.162.206:443' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl --insecure --head --request GET --max-time 5 https://172.30.162.206:443"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:24:00.395069198Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:8, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.395069], [_time:2025-11-27T05:24:00.230+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Binary '/usr/bin/curl' executed with arguments 'http://127.0.0.1:10248/ --max-time 2' under user ID 999, id:dc19e2ff-e358-4ffb-ae64-d17a614fe23d, signature:Detects misuse of the healthz/kubelet API/heapster endpoint, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Process Targeting Cluster Kubelet Endpoint, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:999:999, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:195045, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "dc19e2ff-e358-4ffb-ae64-d17a614fe23d", "violationMessage": "Binary '/usr/bin/curl' executed with arguments 'http://127.0.0.1:10248/ --max-time 2' under user ID 999", "violationType": "PROCESS_EVENT", "violationTime": "2025-11-27T05:24:00.230481435Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "podUid": "9e95252e-aa90-552a-a130-a62a90db7059", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "containerStartTime": "2025-11-27T05:22:41Z", "containerId": "3f15652cec44"}, "alertInfo": {"alertId": "e14e7a24-8cd8-49e3-b218-fdb8d5d0f355", "lifecycleStage": "RUNTIME"}, "processInfo": {"processViolationId": "dc19e2ff-e358-4ffb-ae64-d17a614fe23d", "processSignalId": "47964fd2-cb51-11f0-80f2-0a580a800220", "processCreationTime": "2025-11-27T05:24:00.230481435Z", "processName": "curl", "processArgs": "http://127.0.0.1:10248/ --max-time 2", "execFilePath": "/usr/bin/curl", "pid": 61829, "processUid": 999, "processGid": 999}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "86804b96-e87e-4eae-b56e-1718a8a55763", "policyName": "Process Targeting Cluster Kubelet Endpoint", "policyDescription": "Detects misuse of the healthz/kubelet API/heapster endpoint", "policyRationale": "A pod communicating to a Kubernetes API from via command line is highly irregular", "policyCategories": ["Kubernetes"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:9, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.230481], [_time:2025-11-27T05:24:00.209+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'curl http://127.0.0.1:10248/ --max-time 2' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:06585e7a-363e-5fcc-b8ff-449b8d8c3a39, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68653, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "06585e7a-363e-5fcc-b8ff-449b8d8c3a39", "violationMessage": "Kubernetes API received exec 'curl http://127.0.0.1:10248/ --max-time 2' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "curl http://127.0.0.1:10248/ --max-time 2"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:24:00.209793622Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:10, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.209793], [_time:2025-11-27T05:23:59.575+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:b988d7fc-9062-5f5a-8610-1db5cdbf7a05, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179331, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "b988d7fc-9062-5f5a-8610-1db5cdbf7a05", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:59.575940477Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:11, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.575940], [_time:2025-11-27T05:23:59.399+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:4a3c93ff-6abf-5616-813f-680c87fcb173, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179398, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "4a3c93ff-6abf-5616-813f-680c87fcb173", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:59.399722287Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:12, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.399722], [_time:2025-11-27T05:23:59.107+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:65fa255f-f525-59e3-93ab-b4da16d58bbe, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179465, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "65fa255f-f525-59e3-93ab-b4da16d58bbe", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:59.107988783Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:13, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.107988], [_time:2025-11-27T05:23:55.952+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:0734996b-b3da-56db-a912-15296df6ae5f, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179532, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "0734996b-b3da-56db-a912-15296df6ae5f", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:55.952404645Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:14, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.952404], [_time:2025-11-27T05:23:19.715+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:01a9e69c-1301-5156-acfe-01128abf3227, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179599, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "01a9e69c-1301-5156-acfe-01128abf3227", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:19.715598987Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:15, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.715598], [_time:2025-11-27T05:23:18.817+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:8aac1e45-91a0-5061-ae97-e79498ba5b49, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68729, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8aac1e45-91a0-5061-ae97-e79498ba5b49", "violationMessage": "Kubernetes API received exec 'sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sudo /opt/splunk/bin/splunk set minfreemb 200 -auth admin:helloworld"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:18.817495002Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:16, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.817495], [_time:2025-11-27T05:23:17.887+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:0c3098e7-e18b-5960-8cd3-7b13597f7d09, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179666, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "0c3098e7-e18b-5960-8cd3-7b13597f7d09", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:17.887987642Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:17, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.887987], [_time:2025-11-27T05:23:15.889+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:e8ae6842-7cbe-50b1-9b0d-ff6665cf452f, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179733, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e8ae6842-7cbe-50b1-9b0d-ff6665cf452f", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.889922658Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:18, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.889922], [_time:2025-11-27T05:23:15.796+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; exit $e' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:95203f9c-b77f-5ce2-8f22-b263990e2c5f, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68807, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "95203f9c-b77f-5ce2-8f22-b263990e2c5f", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; exit $e' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar; exit $e"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.796700397Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:19, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.796700], [_time:2025-11-27T05:23:15.704+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar'' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:6ef50fd3-85ba-5573-8853-0eb9b8834b07, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68891, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6ef50fd3-85ba-5573-8853-0eb9b8834b07", "violationMessage": "Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar'' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar'"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.704945449Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:20, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.704945], [_time:2025-11-27T05:23:15.501+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar' && echo $?' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:8d9897f3-6552-5b2f-a039-f34b4a27f46d, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:68969, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8d9897f3-6552-5b2f-a039-f34b4a27f46d", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar' && echo $?' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b82.tar' && echo $?"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.501902042Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:21, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.501902], [_time:2025-11-27T05:23:15.398+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; exit $e' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:b08690de-61fd-589a-8768-5ad154478670, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:69049, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "b08690de-61fd-589a-8768-5ad154478670", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; exit $e' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/'; tar -C '/tmp/' -xmf /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; e=$?; rm /tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar; exit $e"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.398744176Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:22, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.398744], [_time:2025-11-27T05:23:15.278+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar'' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:a86c3734-d3cb-57ec-8ec5-a9dafd8d026e, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:69133, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "a86c3734-d3cb-57ec-8ec5-a9dafd8d026e", "violationMessage": "Kubernetes API received exec 'sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar'' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c wc -c < '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar'"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:15.278181996Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:23, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.278181], [_time:2025-11-27T05:23:14.976+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar' && echo $?' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:9a40206c-8b06-52dd-8b36-db5500bb69cb, signature:Alerts when Kubernetes API receives request to execute command in container, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Kubernetes Actions: Exec into Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6/splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:69211, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "9a40206c-8b06-52dd-8b36-db5500bb69cb", "violationMessage": "Kubernetes API received exec 'sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar' && echo $?' request into pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "container", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, {"key": "commands", "value": "sh -c mkdir -p '/tmp/' && cat - > '/tmp/fabric8-00000000-0000-0000-0000-000000000b57.tar' && echo $?"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:14.976624896Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6", "containerName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "alertInfo": {"alertId": "5337b280-743a-4e8a-9078-d07d3ff49827", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "8ab0f199-4904-4808-9461-3501da1d1b77", "policyName": "Kubernetes Actions: Exec into Pod", "policyDescription": "Alerts when Kubernetes API receives request to execute command in container", "policyRationale": "'pods/exec' is non-standard approach for interacting with containers. Attackers with permissions could execute malicious code and compromise resources within a cluster", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:24, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.976624], [_time:2025-11-27T05:23:13.832+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:774f3bbb-35ba-5a2f-ac70-e139e79ee239, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179800, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "774f3bbb-35ba-5a2f-ac70-e139e79ee239", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:13.832243473Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:25, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.832243], [_time:2025-11-27T05:23:03.754+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:6d58e069-5661-58eb-9789-7323c035b653, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179867, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6d58e069-5661-58eb-9789-7323c035b653", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:23:03.754860569Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:26, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.754860], [_time:2025-11-27T05:22:59.901+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' includes component 'microdnf' (version 3.8.0-2.el8.x86_64) Container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' includes component 'rpm' (version 4.14.3-26.el8.x86_64), id:80ec2b09-aede-4c61-b408-64009272a558, signature:Alert on deployments with components of the Red Hat/Fedora/CentOS package management system., src_type:Deployment, app:stackrox, dest:unknown, severity:low, signature_id:Red Hat Package Manager in Image, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:111096, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "80ec2b09-aede-4c61-b408-64009272a558", "violationMessage": "Container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' includes component 'microdnf' (version 3.8.0-2.el8.x86_64)\nContainer 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' includes component 'rpm' (version 4.14.3-26.el8.x86_64)", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.901477622Z"}, "alertInfo": {"alertId": "80ec2b09-aede-4c61-b408-64009272a558", "alertFirstOccurred": "2025-11-27T05:22:59.901477622Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "f95ff08d-130a-465a-a27e-32ed1fb05555", "policyName": "Red Hat Package Manager in Image", "policyDescription": "Alert on deployments with components of the Red Hat/Fedora/CentOS package management system.", "policyRationale": "Package managers make it easier for attackers to use compromised containers, since they can easily add software.", "policyCategories": ["Security Best Practices"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "LOW_SEVERITY", "policyVersion": "1.1"}}, _serial:27, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.901477], [_time:2025-11-27T05:22:59.900+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Fixable CVE-2019-16942 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.1 Fixable CVE-2019-16943 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.1 Fixable CVE-2019-17531 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.1 Fixable CVE-2019-20330 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.2 Fixable CVE-2020-10650 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4 Fixable CVE-2020-10672 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4 Fixable CVE-2020-10673 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4 Fixable CVE-2020-10968 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4 Fixable CVE-2020-10969 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4 Fixable CVE-2020-11111 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4 Fixable CVE-2020-11112 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4 Fixable CVE-2020-11113 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4 Fixable CVE-2020-11619 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4 Fixable CVE-2020-11620 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4 Fixable CVE-2020-13949 (CVSS 7.5) (severity Important) found in component 'hive' (version 3.1.3) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 4.0.0 Fixable CVE-2020-14060 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5 Fixable CVE-2020-14061 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5 Fixable CVE-2020-14062 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5 Fixable CVE-2020-14195 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5 Fixable CVE-2020-24616 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.6 Fixable CVE-2020-24750 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.6 Fixable CVE-2020-25649 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.7 Fixable CVE-2020-35490 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-35491 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-35728 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-36179 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-36180 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-36181 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-36182 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-36183 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-36184 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-36185 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-36186 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-36187 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-36188 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-36189 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8 Fixable CVE-2020-36518 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.12.6.1 Fixable CVE-2020-8840 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.3 Fixable CVE-2020-9546 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4 Fixable CVE-2020-9547 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4 Fixable CVE-2020-9548 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4 Fixable CVE-2021-20190 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.7 Fixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2019.6.16) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2022.12.7 Fixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2022.9.24) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2022.12.7 Fixable CVE-2022-3171 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 3.16.3 Fixable CVE-2022-42003 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.12.7.1 Fixable CVE-2022-42004 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.12.7.1 Fixable CVE-2023-0341 (CVSS 7.8) (severity Important) found in component 'editorconfig' (version 0.12.3) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0.12.6 Fixable CVE-2023-2976 (CVSS 7.1) (severity Important) found in component 'guava' (version 11.0.2) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 32.0.0 Fixable CVE-2023-37920 (CVSS 9.8) (severity Critical) found in component 'certifi' (version 2019.6.16) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2023.7.22 Fixable CVE-2023-38325 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 41.0.2 Fixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.12) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.26.17 Fixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.6) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.26.17 Fixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 2.0.2) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.0.6 Fixable CVE-2023-49083 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 41.0.6 Fixable CVE-2023-50782 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 42.0.0 Fixable CVE-2024-26130 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 42.0.4 Fixable CVE-2024-7254 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 3.25.5 Fixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.10.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.15.2 Fixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.11.2) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.15.2 Fixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 47.1.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 78.1.1 Fixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 67.8.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 78.1.1 Fixable CVE-2025-47436 (CVSS 9.8) (severity Critical) found in component 'orc' (version 1.5.8) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.8.9 Fixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-25.el8_8 Fixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-25.el8_8 Fixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.1 Fixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.1 Fixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6 Fixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6 Fixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6 Fixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6 Fixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6 Fixable RHSA-2023:5837 (CVSS 7.5) (severity Important) found in component 'libnghttp2' (version 1.33.0-3.el8_2.1.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.33.0-5.el8_8 Fixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.2 Fixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.2 Fixable RHSA-2024:10379 (CVSS 7.4) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.3.1-36.el8_10 Fixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13 Fixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13 Fixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13 Fixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13 Fixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13 Fixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1 Fixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1 Fixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1 Fixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1 Fixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1 Fixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2 Fixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2 Fixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2 Fixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2 Fixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2 Fixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-62.el8_10 Fixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-62.el8_10 Fixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'platform-python-setuptools' (version 39.2.0-7.el8.noarch) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:39.2.0-8.el8_10 Fixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'python3-setuptools-wheel' (version 39.2.0-7.el8.noarch) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:39.2.0-8.el8_10 Fixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-30.el8_10 Fixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-30.el8_10 Fixable RHSA-2025:10027 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.3.1-37.el8_10 Fixable RHSA-2025:10110 (CVSS 7) (severity Important) found in component 'sudo' (version 1.8.29-10.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.9.5p2-1.el8_10.1 Fixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-70.el8_10 Fixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-70.el8_10 Fixable RHSA-2025:10698 (CVSS 9.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.9.7-21.el8_10.1 Fixable RHSA-2025:12010 (CVSS 7.7) (severity Important) found in component 'sqlite-libs' (version 3.26.0-17.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.26.0-20.el8_10 Fixable RHSA-2025:12450 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.9.7-21.el8_10.2 Fixable RHSA-2025:14135 (CVSS 7.3) (severity Important) found in component 'libarchive' (version 3.3.3-5.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.3.3-6.el8_10 Fixable RHSA-2025:14557 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.3.1-38.el8_10 Fixable RHSA-2025:21776 (CVSS 5.3) (severity Important) found in component 'expat' (version 2.2.5-11.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.5.0-1.el8_10 Fixable RHSA-2025:2686 (CVSS 8.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.9.7-19.el8_10, id:dd23737f-ec6f-41eb-812a-25114376a1f2, signature:Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important, src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Fixable Severity at least Important, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:191492, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "dd23737f-ec6f-41eb-812a-25114376a1f2", "violationMessage": "Fixable CVE-2019-16942 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.1\nFixable CVE-2019-16943 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.1\nFixable CVE-2019-17531 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.1\nFixable CVE-2019-20330 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.2\nFixable CVE-2020-10650 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-10672 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-10673 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-10968 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-10969 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11111 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11112 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11113 (CVSS 8.8) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11619 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-11620 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-13949 (CVSS 7.5) (severity Important) found in component 'hive' (version 3.1.3) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 4.0.0\nFixable CVE-2020-14060 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5\nFixable CVE-2020-14061 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5\nFixable CVE-2020-14062 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5\nFixable CVE-2020-14195 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.5\nFixable CVE-2020-24616 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.6\nFixable CVE-2020-24750 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.6\nFixable CVE-2020-25649 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.7\nFixable CVE-2020-35490 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-35491 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-35728 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36179 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36180 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36181 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36182 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36183 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36184 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36185 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36186 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36187 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36188 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36189 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.8\nFixable CVE-2020-36518 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.12.6.1\nFixable CVE-2020-8840 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.3\nFixable CVE-2020-9546 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-9547 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2020-9548 (CVSS 9.8) (severity Critical) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.4\nFixable CVE-2021-20190 (CVSS 8.1) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.9.10.7\nFixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2019.6.16) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2022.12.7\nFixable CVE-2022-23491 (CVSS 7.5) (severity Important) found in component 'certifi' (version 2022.9.24) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2022.12.7\nFixable CVE-2022-3171 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 3.16.3\nFixable CVE-2022-42003 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.12.7.1\nFixable CVE-2022-42004 (CVSS 7.5) (severity Important) found in component 'jackson-databind' (version 2.9.10) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.12.7.1\nFixable CVE-2023-0341 (CVSS 7.8) (severity Important) found in component 'editorconfig' (version 0.12.3) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0.12.6\nFixable CVE-2023-2976 (CVSS 7.1) (severity Important) found in component 'guava' (version 11.0.2) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 32.0.0\nFixable CVE-2023-37920 (CVSS 9.8) (severity Critical) found in component 'certifi' (version 2019.6.16) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2023.7.22\nFixable CVE-2023-38325 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 41.0.2\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.12) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.26.17\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 1.26.6) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.26.17\nFixable CVE-2023-43804 (CVSS 8.1) (severity Important) found in component 'urllib3' (version 2.0.2) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 2.0.6\nFixable CVE-2023-49083 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 41.0.6\nFixable CVE-2023-50782 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 42.0.0\nFixable CVE-2024-26130 (CVSS 7.5) (severity Important) found in component 'cryptography' (version 41.0.1) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 42.0.4\nFixable CVE-2024-7254 (CVSS 7.5) (severity Important) found in component 'protobuf-java' (version 2.5.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 3.25.5\nFixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.10.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.15.2\nFixable CVE-2025-46762 (CVSS 8.1) (severity Important) found in component 'parquet' (version 1.11.2) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.15.2\nFixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 47.1.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 78.1.1\nFixable CVE-2025-47273 (CVSS 8.8) (severity Important) found in component 'setuptools' (version 67.8.0) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 78.1.1\nFixable CVE-2025-47436 (CVSS 9.8) (severity Critical) found in component 'orc' (version 1.5.8) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 1.8.9\nFixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-25.el8_8\nFixable RHEA-2023:3850 (CVSS 8.8) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-25.el8_8\nFixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.1\nFixable RHSA-2023:3591 (CVSS 7.5) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.1\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5455 (CVSS 7.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-225.el8_8.6\nFixable RHSA-2023:5837 (CVSS 7.5) (severity Important) found in component 'libnghttp2' (version 1.33.0-3.el8_2.1.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.33.0-5.el8_8\nFixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.2\nFixable RHSA-2023:5997 (CVSS 8.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-51.el8_8.2\nFixable RHSA-2024:10379 (CVSS 7.4) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.3.1-36.el8_10\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:2722 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-236.el8_9.13\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3269 (CVSS 8.8) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.1\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-common' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-headers' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-langpack-en' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3344 (CVSS 7.6) (severity Important) found in component 'glibc-minimal-langpack' (version 2.28-225.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.28-251.el8_10.2\nFixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-62.el8_10\nFixable RHSA-2024:3347 (CVSS 7.8) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-62.el8_10\nFixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'platform-python-setuptools' (version 39.2.0-7.el8.noarch) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:39.2.0-8.el8_10\nFixable RHSA-2024:5530 (CVSS 8.8) (severity Important) found in component 'python3-setuptools-wheel' (version 39.2.0-7.el8.noarch) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:39.2.0-8.el8_10\nFixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'krb5-libs' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-30.el8_10\nFixable RHSA-2024:8860 (CVSS 9) (severity Important) found in component 'libkadm5' (version 1.18.2-22.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.18.2-30.el8_10\nFixable RHSA-2025:10027 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.3.1-37.el8_10\nFixable RHSA-2025:10110 (CVSS 7) (severity Important) found in component 'sudo' (version 1.8.29-10.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.9.5p2-1.el8_10.1\nFixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'platform-python' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-70.el8_10\nFixable RHSA-2025:10128 (CVSS 7.6) (severity Important) found in component 'python3-libs' (version 3.6.8-51.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.6.8-70.el8_10\nFixable RHSA-2025:10698 (CVSS 9.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.9.7-21.el8_10.1\nFixable RHSA-2025:12010 (CVSS 7.7) (severity Important) found in component 'sqlite-libs' (version 3.26.0-17.el8_7.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.26.0-20.el8_10\nFixable RHSA-2025:12450 (CVSS 7.8) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.9.7-21.el8_10.2\nFixable RHSA-2025:14135 (CVSS 7.3) (severity Important) found in component 'libarchive' (version 3.3.3-5.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:3.3.3-6.el8_10\nFixable RHSA-2025:14557 (CVSS 7.8) (severity Important) found in component 'pam' (version 1.3.1-25.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:1.3.1-38.el8_10\nFixable RHSA-2025:21776 (CVSS 5.3) (severity Important) found in component 'expat' (version 2.2.5-11.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.5.0-1.el8_10\nFixable RHSA-2025:2686 (CVSS 8.1) (severity Important) found in component 'libxml2' (version 2.9.7-16.el8.x86_64) in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', resolved by version 0:2.9.7-19.el8_10", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.900774486Z"}, "alertInfo": {"alertId": "dd23737f-ec6f-41eb-812a-25114376a1f2", "alertFirstOccurred": "2025-11-27T05:22:59.900774486Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "a919ccaf-6b43-4160-ac5d-a405e1440a41", "policyName": "Fixable Severity at least Important", "policyDescription": "Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important", "policyRationale": "Known vulnerabilities make it easier for adversaries to exploit your application. You can fix these high-severity vulnerabilities by updating to a newer version of the affected component(s).", "policyCategories": ["Vulnerability Management"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:28, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.900774], [_time:2025-11-27T05:22:59.893+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:CPU request set to 0 cores for container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' Memory limit set to 0 MB for container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:77b1132f-4fe2-4347-a5af-3b7241e9c3d6, signature:Alert on deployments that have containers without CPU request or memory limit, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:No CPU request or memory limit specified, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:102977, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "77b1132f-4fe2-4347-a5af-3b7241e9c3d6", "violationMessage": "CPU request set to 0 cores for container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'\nMemory limit set to 0 MB for container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.893566523Z"}, "alertInfo": {"alertId": "77b1132f-4fe2-4347-a5af-3b7241e9c3d6", "alertFirstOccurred": "2025-11-27T05:22:59.893566523Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "886c3c94-3a6a-4f2b-82fc-d6bf5a310840", "policyName": "No CPU request or memory limit specified", "policyDescription": "Alert on deployments that have containers without CPU request or memory limit", "policyRationale": "A container without a specified CPU request may be starved for CPU time, while a container without a specified memory limit may cause the host to become over-provisioned.", "policyCategories": ["DevOps Best Practices", "Docker CIS"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:29, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.893566], [_time:2025-11-27T05:22:59.893+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Deployment mounts the service account tokens. Namespace has name 'qa-splunk' Service Account is set to 'default', id:9b208c57-298c-4e60-9010-46129f88e4df, signature:Protect pod default service account tokens from compromise by minimizing the mounting of the default service account token to only those pods whose application requires interaction with the Kubernetes API., src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Pod Service Account Token Automatically Mounted, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:133245, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "9b208c57-298c-4e60-9010-46129f88e4df", "violationMessage": "Deployment mounts the service account tokens.\nNamespace has name 'qa-splunk'\nService Account is set to 'default'", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.893471221Z"}, "alertInfo": {"alertId": "9b208c57-298c-4e60-9010-46129f88e4df", "alertFirstOccurred": "2025-11-27T05:22:59.893471221Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "fb8f8732-c31d-496b-8fb1-d5abe6056e27", "policyName": "Pod Service Account Token Automatically Mounted", "policyDescription": "Protect pod default service account tokens from compromise by minimizing the mounting of the default service account token to only those pods whose application requires interaction with the Kubernetes API.", "policyRationale": "By default, Kubernetes automatically provisions a service account for each pod and mounts the secret at runtime. This service account is not typically used. If this pod is compromised and the compromised user has access to the service account, the service account could be used to escalate privileges within the cluster. To reduce the likelihood of privilege escalation this service account should not be mounted by default unless the pod requires direct access to the Kubernetes API as part of the pods functionality.", "policyCategories": ["Privileges", "Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:30, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.893471], [_time:2025-11-27T05:22:59.893+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Environment variable 'SPLUNK_PASSWORD' is present in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9', id:e548ab37-cb13-4384-b4f9-be4a1f478da6, signature:Alert on deployments with environment variables that contain 'SECRET', src_type:Deployment, app:stackrox, dest:unknown, severity:high, signature_id:Environment Variable Contains Secret, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:198280, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e548ab37-cb13-4384-b4f9-be4a1f478da6", "violationMessage": "Environment variable 'SPLUNK_PASSWORD' is present in container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9'", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.893416399Z"}, "alertInfo": {"alertId": "e548ab37-cb13-4384-b4f9-be4a1f478da6", "alertFirstOccurred": "2025-11-27T05:22:59.893416399Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "f4996314-c3d7-4553-803b-b24ce7febe48", "policyName": "Environment Variable Contains Secret", "policyDescription": "Alert on deployments with environment variables that contain 'SECRET'", "policyRationale": "Using secrets in environment variables may allow inspection into your secrets from the host or even through the orchestrator UI.", "policyCategories": ["Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "HIGH_SEVERITY", "policyVersion": "1.1"}}, _serial:31, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.893416], [_time:2025-11-27T05:22:59.892+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' allows privilege escalation, id:fa69e6ff-bcab-4f34-b50b-e084b1c11f8c, signature:Alerts if a deployment has containers with allowPrivilegeEscalation set to true in its security context., src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Container with privilege escalation allowed, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:219250, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "fa69e6ff-bcab-4f34-b50b-e084b1c11f8c", "violationMessage": "Container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' allows privilege escalation", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.892935189Z"}, "alertInfo": {"alertId": "fa69e6ff-bcab-4f34-b50b-e084b1c11f8c", "alertFirstOccurred": "2025-11-27T05:22:59.892935189Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "16c95922-08c4-41b6-a721-dc4b2a806632", "policyName": "Container with privilege escalation allowed", "policyDescription": "Alerts if a deployment has containers with allowPrivilegeEscalation set to true in its security context.", "policyRationale": "A container process can run with more privileges than its parent process if the container's security context has the boolean setting allowPrivilegeEscalation enabled. In Kubernetes pods, this setting is true by default. Set the value to false if the pod is to run as a non-root user.", "policyCategories": ["Privileges", "Security Best Practices"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:32, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.892935], [_time:2025-11-27T05:22:59.892+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' has image created at 2023-06-03 01:21:18 (UTC), id:5d2a43b4-2797-4944-bce4-ecfc87d1724c, signature:Alert on deployments with images that haven't been updated in 90 days, src_type:Deployment, app:stackrox, dest:unknown, severity:low, signature_id:90-Day Image Age, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:77612, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "5d2a43b4-2797-4944-bce4-ecfc87d1724c", "violationMessage": "Container 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9' has image created at 2023-06-03 01:21:18 (UTC)", "violationType": "GENERIC", "violationTime": "2025-11-27T05:22:59.892911488Z"}, "alertInfo": {"alertId": "5d2a43b4-2797-4944-bce4-ecfc87d1724c", "alertFirstOccurred": "2025-11-27T05:22:59.892911488Z"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "2db9a279-2aec-4618-a85d-7f1bdf4911b1", "policyName": "90-Day Image Age", "policyDescription": "Alert on deployments with images that haven't been updated in 90 days", "policyRationale": "Base images are updated frequently with bug fixes and vulnerability patches. Image age exceeding 90 days may indicate a higher risk of vulnerabilities existing in the image.", "policyCategories": ["DevOps Best Practices", "Security Best Practices", "Supply Chain Security"], "policyLifecycleStages": ["BUILD", "DEPLOY"], "policySeverity": "LOW_SEVERITY", "policyVersion": "1.1"}}, _serial:33, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.892911], [_time:2025-11-27T05:22:53.693+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:60ab0342-7087-5278-a1c5-93033f99dd2a, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:179934, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "60ab0342-7087-5278-a1c5-93033f99dd2a", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:22:53.693516480Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:34, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.693516], [_time:2025-11-27T05:22:43.622+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089', id:fe0ffa45-ea88-59ea-9bc5-2dcd01dd4ea1, signature:Alerts when Kubernetes API receives port forward request, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Kubernetes Actions: Port Forward to Pod, src:remote/qa-splunk/Deployment:splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 > splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:180001, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "fe0ffa45-ea88-59ea-9bc5-2dcd01dd4ea1", "violationMessage": "Kubernetes API received port forward request to pod 'splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6' ports '8089'", "violationMessageAttributes": [{"key": "pod", "value": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, {"key": "ports", "value": "8089"}, {"key": "Username", "value": "system:admin"}, {"key": "Groups", "value": "system:masters, system:authenticated"}], "violationType": "K8S_EVENT", "violationTime": "2025-11-27T05:22:43.622314637Z", "podId": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6"}, "alertInfo": {"alertId": "d29a6ab1-552d-4372-a8e3-e699fdf36e0b", "lifecycleStage": "RUNTIME"}, "deploymentInfo": {"deploymentId": "642df538-67cd-4e03-9ac6-372c5d10d0dd", "deploymentName": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "deploymentType": "Deployment", "deploymentNamespace": "qa-splunk", "deploymentNamespaceId": "c7975228-1507-41dc-b160-1032a52a6743", "deploymentLabels": {"app": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9", "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:022847393d790778df9a7320083a004d85a5689492ce33a07e0d552b129c02c9", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa", "tag": "splunk-test-repo-9-0-5", "fullName": "quay.io/rhacs-eng/qa:splunk-test-repo-9-0-5"}}, "name": "splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9"}]}, "policyInfo": {"policyId": "742e0361-bddd-4a2d-8758-f2af6197f61d", "policyName": "Kubernetes Actions: Port Forward to Pod", "policyDescription": "Alerts when Kubernetes API receives port forward request", "policyRationale": "'pods/portforward' is non-standard way to access applications running on Kubernetes. Attackers with permissions could gain access to application and compromise it", "policyCategories": ["Kubernetes Events"], "policyLifecycleStages": ["RUNTIME"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:35, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.622314], [_time:2025-11-27T05:20:28.497+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:8fdaa510-641f-4ae1-b241-cdb863c1811d, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:123701, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8fdaa510-641f-4ae1-b241-cdb863c1811d", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.497728555Z"}, "alertInfo": {"alertId": "8fdaa510-641f-4ae1-b241-cdb863c1811d", "alertFirstOccurred": "2025-11-27T05:20:28.497728555Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:36, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.497728], [_time:2025-11-27T05:20:28.410+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644)., id:ea4473cc-cf05-4067-81e7-bc4d8cbb5b43, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:202279, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "ea4473cc-cf05-4067-81e7-bc4d8cbb5b43", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.410415400Z"}, "alertInfo": {"alertId": "ea4473cc-cf05-4067-81e7-bc4d8cbb5b43", "alertFirstOccurred": "2025-11-27T05:20:28.410415400Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:37, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.410415], [_time:2025-11-27T05:20:28.222+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1)., id:ea7c47f2-50ef-4ca6-8e6b-b062aaadee08, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-sigstore, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:202500, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "ea7c47f2-50ef-4ca6-8e6b-b062aaadee08", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.222047488Z"}, "alertInfo": {"alertId": "ea7c47f2-50ef-4ca6-8e6b-b062aaadee08", "alertFirstOccurred": "2025-11-27T05:20:28.222047488Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:38, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.222047], [_time:2025-11-27T05:20:28.221+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1)., id:eaa7a39a-c976-402f-9a60-c316789701b6, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-sigstore, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:202612, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "eaa7a39a-c976-402f-9a60-c316789701b6", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.221979587Z"}, "alertInfo": {"alertId": "eaa7a39a-c976-402f-9a60-c316789701b6", "alertFirstOccurred": "2025-11-27T05:20:28.221979587Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:39, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.221979], [_time:2025-11-27T05:20:28.221+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf)., id:1023c391-7d30-44b7-907b-aa2c0ddd96d1, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:11883, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "1023c391-7d30-44b7-907b-aa2c0ddd96d1", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.221585658Z"}, "alertInfo": {"alertId": "1023c391-7d30-44b7-907b-aa2c0ddd96d1", "alertFirstOccurred": "2025-11-27T05:20:28.221585658Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:40, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.221585], [_time:2025-11-27T05:20:28.217+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf)., id:b390365d-0f9e-4d2d-aa9d-bff80b657fc8, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:153918, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "b390365d-0f9e-4d2d-aa9d-bff80b657fc8", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.217622628Z"}, "alertInfo": {"alertId": "b390365d-0f9e-4d2d-aa9d-bff80b657fc8", "alertFirstOccurred": "2025-11-27T05:20:28.217622628Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:41, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.217622], [_time:2025-11-27T05:20:28.149+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677)., id:6766b714-2d5d-4e9b-9d6c-5dd2c15b85ac, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-distroless, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:86006, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6766b714-2d5d-4e9b-9d6c-5dd2c15b85ac", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.149673431Z"}, "alertInfo": {"alertId": "6766b714-2d5d-4e9b-9d6c-5dd2c15b85ac", "alertFirstOccurred": "2025-11-27T05:20:28.149673431Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:42, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.149673], [_time:2025-11-27T05:20:28.103+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:1bacde3c-d6a8-40af-a188-d7f5ea3338dc, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:23239, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "1bacde3c-d6a8-40af-a188-d7f5ea3338dc", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.103362713Z"}, "alertInfo": {"alertId": "1bacde3c-d6a8-40af-a188-d7f5ea3338dc", "alertFirstOccurred": "2025-11-27T05:20:28.103362713Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:43, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.103362], [_time:2025-11-27T05:20:28.103+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:e9b3e6e7-5652-4887-bf0a-f5857c9c62b8, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:201736, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e9b3e6e7-5652-4887-bf0a-f5857c9c62b8", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.103281951Z"}, "alertInfo": {"alertId": "e9b3e6e7-5652-4887-bf0a-f5857c9c62b8", "alertFirstOccurred": "2025-11-27T05:20:28.103281951Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:44, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.103281], [_time:2025-11-27T05:20:28.102+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:ae424497-b7bd-49be-a236-e54d00039253, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:150235, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "ae424497-b7bd-49be-a236-e54d00039253", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.102040863Z"}, "alertInfo": {"alertId": "ae424497-b7bd-49be-a236-e54d00039253", "alertFirstOccurred": "2025-11-27T05:20:28.102040863Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:45, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.102040], [_time:2025-11-27T05:20:28.097+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:4bec9b1e-265c-45d6-8711-e36df4fc11e9, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:62723, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "4bec9b1e-265c-45d6-8711-e36df4fc11e9", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.097373318Z"}, "alertInfo": {"alertId": "4bec9b1e-265c-45d6-8711-e36df4fc11e9", "alertFirstOccurred": "2025-11-27T05:20:28.097373318Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:46, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.097373], [_time:2025-11-27T05:20:28.095+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043)., id:e7488ffc-730e-4ce4-ade4-b548070b020e, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:byopki, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:199146, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e7488ffc-730e-4ce4-ade4-b548070b020e", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.095140477Z"}, "alertInfo": {"alertId": "e7488ffc-730e-4ce4-ade4-b548070b020e", "alertFirstOccurred": "2025-11-27T05:20:28.095140477Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:47, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.095140], [_time:2025-11-27T05:20:28.094+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043)., id:49e6d51c-ae4f-4fa1-8c89-7ea82cf9606b, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Distroless+Tekton+Unverifiable, src:remote/qa-signature-tests/Deployment:byopki, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:60736, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "49e6d51c-ae4f-4fa1-8c89-7ea82cf9606b", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.094709837Z"}, "alertInfo": {"alertId": "49e6d51c-ae4f-4fa1-8c89-7ea82cf9606b", "alertFirstOccurred": "2025-11-27T05:20:28.094709837Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "dd135f6f-af45-4695-966a-d558a1aa191b", "policyName": "Distroless+Tekton+Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:48, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.094709], [_time:2025-11-27T05:20:28.074+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:0c6ae6ab-d255-41d6-8113-bc5a76ef7a3b, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:9325, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "0c6ae6ab-d255-41d6-8113-bc5a76ef7a3b", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.074049610Z"}, "alertInfo": {"alertId": "0c6ae6ab-d255-41d6-8113-bc5a76ef7a3b", "alertFirstOccurred": "2025-11-27T05:20:28.074049610Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:49, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.074049], [_time:2025-11-27T05:20:28.056+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644)., id:6dcc405d-62ce-4026-9d14-349d134279f3, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:93705, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6dcc405d-62ce-4026-9d14-349d134279f3", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.056405351Z"}, "alertInfo": {"alertId": "6dcc405d-62ce-4026-9d14-349d134279f3", "alertFirstOccurred": "2025-11-27T05:20:28.056405351Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:50, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.056405], [_time:2025-11-27T05:20:28.055+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c)., id:7cb256e6-cd38-4759-b1d0-2789b59f385c, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-tekton, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:107408, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7cb256e6-cd38-4759-b1d0-2789b59f385c", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:28.055693505Z"}, "alertInfo": {"alertId": "7cb256e6-cd38-4759-b1d0-2789b59f385c", "alertFirstOccurred": "2025-11-27T05:20:28.055693505Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "b07118b7-5c2d-4176-b39e-1e58b932d5bd", "policyName": "Keyless-RHTAS-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:51, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.055693], [_time:2025-11-27T05:20:27.894+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1)., id:79da2009-dc25-4d01-a55c-b0aa61c1091e, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-sigstore, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:105152, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "79da2009-dc25-4d01-a55c-b0aa61c1091e", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.894311344Z"}, "alertInfo": {"alertId": "79da2009-dc25-4d01-a55c-b0aa61c1091e", "alertFirstOccurred": "2025-11-27T05:20:27.894311344Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:52, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.894311], [_time:2025-11-27T05:20:27.894+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1)., id:a1191d6f-3b2a-4d35-9029-6fc39b46ed88, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:keyless-sigstore, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:138604, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "a1191d6f-3b2a-4d35-9029-6fc39b46ed88", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.894241412Z"}, "alertInfo": {"alertId": "a1191d6f-3b2a-4d35-9029-6fc39b46ed88", "alertFirstOccurred": "2025-11-27T05:20:27.894241412Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:53, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.894241], [_time:2025-11-27T05:20:27.893+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf)., id:37ff2b27-e1b2-48c6-af71-5a1039500137, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:46860, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "37ff2b27-e1b2-48c6-af71-5a1039500137", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.893683119Z"}, "alertInfo": {"alertId": "37ff2b27-e1b2-48c6-af71-5a1039500137", "alertFirstOccurred": "2025-11-27T05:20:27.893683119Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:54, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.893683], [_time:2025-11-27T05:20:27.889+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf)., id:41cf2359-0e3e-4809-89b4-7ddafea39dd8, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:54032, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "41cf2359-0e3e-4809-89b4-7ddafea39dd8", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.889313970Z"}, "alertInfo": {"alertId": "41cf2359-0e3e-4809-89b4-7ddafea39dd8", "alertFirstOccurred": "2025-11-27T05:20:27.889313970Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:55, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.889313], [_time:2025-11-27T05:20:27.861+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c)., id:244026f7-62ac-468a-af0c-c967af27d440, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-tekton, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:29926, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "244026f7-62ac-468a-af0c-c967af27d440", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.861982452Z"}, "alertInfo": {"alertId": "244026f7-62ac-468a-af0c-c967af27d440", "alertFirstOccurred": "2025-11-27T05:20:27.861982452Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:56, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.861982], [_time:2025-11-27T05:20:27.861+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c)., id:fadc9c7e-6147-466f-8338-bc41171a22a3, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-tekton, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:219749, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "fadc9c7e-6147-466f-8338-bc41171a22a3", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.861767787Z"}, "alertInfo": {"alertId": "fadc9c7e-6147-466f-8338-bc41171a22a3", "alertFirstOccurred": "2025-11-27T05:20:27.861767787Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:57, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.861767], [_time:2025-11-27T05:20:27.813+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677)., id:494110d4-9cfb-4f1a-8fc7-286ce1ec6aaa, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-distroless, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:60320, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "494110d4-9cfb-4f1a-8fc7-286ce1ec6aaa", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.813848443Z"}, "alertInfo": {"alertId": "494110d4-9cfb-4f1a-8fc7-286ce1ec6aaa", "alertFirstOccurred": "2025-11-27T05:20:27.813848443Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:58, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.813848], [_time:2025-11-27T05:20:27.812+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677)., id:6e2b7a51-344f-4e40-8696-05a3caa9d8f9, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-distroless, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:94102, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6e2b7a51-344f-4e40-8696-05a3caa9d8f9", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.812954333Z"}, "alertInfo": {"alertId": "6e2b7a51-344f-4e40-8696-05a3caa9d8f9", "alertFirstOccurred": "2025-11-27T05:20:27.812954333Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:59, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.812954], [_time:2025-11-27T05:20:27.785+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644)., id:4219ecc4-0657-4f3f-8e65-b1e02c73dc60, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:54224, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "4219ecc4-0657-4f3f-8e65-b1e02c73dc60", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.785467881Z"}, "alertInfo": {"alertId": "4219ecc4-0657-4f3f-8e65-b1e02c73dc60", "alertFirstOccurred": "2025-11-27T05:20:27.785467881Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:60, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.785467], [_time:2025-11-27T05:20:27.777+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:c7d2c760-f15c-4a5d-9036-bc5344476ddb, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:170272, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "c7d2c760-f15c-4a5d-9036-bc5344476ddb", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.777545122Z"}, "alertInfo": {"alertId": "c7d2c760-f15c-4a5d-9036-bc5344476ddb", "alertFirstOccurred": "2025-11-27T05:20:27.777545122Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:61, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.777545], [_time:2025-11-27T05:20:27.772+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043)., id:08243a3a-6212-413f-9e34-280468ebc434, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:byopki, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:6379, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "08243a3a-6212-413f-9e34-280468ebc434", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.772035977Z"}, "alertInfo": {"alertId": "08243a3a-6212-413f-9e34-280468ebc434", "alertFirstOccurred": "2025-11-27T05:20:27.772035977Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:62, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.772035], [_time:2025-11-27T05:20:27.765+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:30ee1ed7-f4c8-4b55-8768-456ab0cf51c1, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:41097, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "30ee1ed7-f4c8-4b55-8768-456ab0cf51c1", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.765400647Z"}, "alertInfo": {"alertId": "30ee1ed7-f4c8-4b55-8768-456ab0cf51c1", "alertFirstOccurred": "2025-11-27T05:20:27.765400647Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:63, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.765400], [_time:2025-11-27T05:20:27.764+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:4a99896c-f19d-4586-b6eb-fe37dbb8323a, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:61879, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "4a99896c-f19d-4586-b6eb-fe37dbb8323a", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.764980527Z"}, "alertInfo": {"alertId": "4a99896c-f19d-4586-b6eb-fe37dbb8323a", "alertFirstOccurred": "2025-11-27T05:20:27.764980527Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:64, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.764980], [_time:2025-11-27T05:20:27.743+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:f2934833-88ff-433a-b360-f53f5d50f65e, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-RHTAS-Matching, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:207918, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "f2934833-88ff-433a-b360-f53f5d50f65e", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.743456920Z"}, "alertInfo": {"alertId": "f2934833-88ff-433a-b360-f53f5d50f65e", "alertFirstOccurred": "2025-11-27T05:20:27.743456920Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "2290a644-1022-4f34-b0b2-d535c30f054e", "policyName": "Keyless-RHTAS-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:65, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.743456], [_time:2025-11-27T05:20:27.743+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:8af6f2d6-b3cf-4941-87a7-1dd3397c6a18, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:119149, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8af6f2d6-b3cf-4941-87a7-1dd3397c6a18", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.743024881Z"}, "alertInfo": {"alertId": "8af6f2d6-b3cf-4941-87a7-1dd3397c6a18", "alertFirstOccurred": "2025-11-27T05:20:27.743024881Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:66, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.743024], [_time:2025-11-27T05:20:27.580+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:20d8221a-bef7-48ff-bc01-a7c1ace83f93, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:27020, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "20d8221a-bef7-48ff-bc01-a7c1ace83f93", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.580147246Z"}, "alertInfo": {"alertId": "20d8221a-bef7-48ff-bc01-a7c1ace83f93", "alertFirstOccurred": "2025-11-27T05:20:27.580147246Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:67, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.580147], [_time:2025-11-27T05:20:27.580+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:25f8dd53-fbd5-4361-9cbb-54348ec56100, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:31597, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "25f8dd53-fbd5-4361-9cbb-54348ec56100", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.580129875Z"}, "alertInfo": {"alertId": "25f8dd53-fbd5-4361-9cbb-54348ec56100", "alertFirstOccurred": "2025-11-27T05:20:27.580129875Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:68, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.580129], [_time:2025-11-27T05:20:27.580+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:e7eb3470-3de0-41ca-b800-985459331b68, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:199681, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e7eb3470-3de0-41ca-b800-985459331b68", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.580035473Z"}, "alertInfo": {"alertId": "e7eb3470-3de0-41ca-b800-985459331b68", "alertFirstOccurred": "2025-11-27T05:20:27.580035473Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:69, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.580035], [_time:2025-11-27T05:20:27.573+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043)., id:8efbf4ef-be56-49f0-b5e6-45ac3db4acdd, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Unverifiable, src:remote/qa-signature-tests/Deployment:byopki, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:123263, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "8efbf4ef-be56-49f0-b5e6-45ac3db4acdd", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.573188538Z"}, "alertInfo": {"alertId": "8efbf4ef-be56-49f0-b5e6-45ac3db4acdd", "alertFirstOccurred": "2025-11-27T05:20:27.573188538Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "fd862ffa-5eaa-4b39-b35d-2ab577b81329", "policyName": "Keyless-Sigstore-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:70, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.573188], [_time:2025-11-27T05:20:27.573+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043)., id:83750eb8-eccf-40ab-92a8-3f55d1c42a76, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:byopki, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:113325, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "83750eb8-eccf-40ab-92a8-3f55d1c42a76", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.573171338Z"}, "alertInfo": {"alertId": "83750eb8-eccf-40ab-92a8-3f55d1c42a76", "alertFirstOccurred": "2025-11-27T05:20:27.573171338Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:71, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.573171], [_time:2025-11-27T05:20:27.515+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644)., id:77e0beab-e45c-42c9-b9ad-0adb907c1166, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:103037, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "77e0beab-e45c-42c9-b9ad-0adb907c1166", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.515850381Z"}, "alertInfo": {"alertId": "77e0beab-e45c-42c9-b9ad-0adb907c1166", "alertFirstOccurred": "2025-11-27T05:20:27.515850381Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:72, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.515850], [_time:2025-11-27T05:20:27.515+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644)., id:941488d0-4008-40cc-95ed-bb2661e31a27, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:127228, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "941488d0-4008-40cc-95ed-bb2661e31a27", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.515807530Z"}, "alertInfo": {"alertId": "941488d0-4008-40cc-95ed-bb2661e31a27", "alertFirstOccurred": "2025-11-27T05:20:27.515807530Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:73, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.515807], [_time:2025-11-27T05:20:27.510+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c)., id:f40e1cb6-cefa-4b40-b4d5-28655c84383f, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-tekton, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:209171, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "f40e1cb6-cefa-4b40-b4d5-28655c84383f", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.510527681Z"}, "alertInfo": {"alertId": "f40e1cb6-cefa-4b40-b4d5-28655c84383f", "alertFirstOccurred": "2025-11-27T05:20:27.510527681Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:74, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.510527], [_time:2025-11-27T05:20:27.477+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677)., id:5111664b-418a-4ec7-8288-6ceb49c1d7c3, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-distroless, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:67063, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "5111664b-418a-4ec7-8288-6ceb49c1d7c3", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.477956054Z"}, "alertInfo": {"alertId": "5111664b-418a-4ec7-8288-6ceb49c1d7c3", "alertFirstOccurred": "2025-11-27T05:20:27.477956054Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:75, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.477956], [_time:2025-11-27T05:20:27.457+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:30378015-ac84-4f9f-8a09-71e220f10dd0, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:40654, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "30378015-ac84-4f9f-8a09-71e220f10dd0", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.457541972Z"}, "alertInfo": {"alertId": "30378015-ac84-4f9f-8a09-71e220f10dd0", "alertFirstOccurred": "2025-11-27T05:20:27.457541972Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:76, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.457541], [_time:2025-11-27T05:20:27.456+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:f621e68d-ec8e-4f4e-8749-5afdf9ed9471, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:211943, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "f621e68d-ec8e-4f4e-8749-5afdf9ed9471", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.456544579Z"}, "alertInfo": {"alertId": "f621e68d-ec8e-4f4e-8749-5afdf9ed9471", "alertFirstOccurred": "2025-11-27T05:20:27.456544579Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:77, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.456544], [_time:2025-11-27T05:20:27.456+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1)., id:de42bd44-525a-4e3e-9f1b-ccece654be72, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:keyless-sigstore, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:193169, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "de42bd44-525a-4e3e-9f1b-ccece654be72", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.456201972Z"}, "alertInfo": {"alertId": "de42bd44-525a-4e3e-9f1b-ccece654be72", "alertFirstOccurred": "2025-11-27T05:20:27.456201972Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:78, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.456201], [_time:2025-11-27T05:20:27.455+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf)., id:6fbeb7d5-1081-407c-87ce-e4318ba009d2, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:95999, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "6fbeb7d5-1081-407c-87ce-e4318ba009d2", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.455134907Z"}, "alertInfo": {"alertId": "6fbeb7d5-1081-407c-87ce-e4318ba009d2", "alertFirstOccurred": "2025-11-27T05:20:27.455134907Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:79, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.455134], [_time:2025-11-27T05:20:27.451+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf)., id:37a14544-fd7b-4640-b435-d17438fb1031, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:46539, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "37a14544-fd7b-4640-b435-d17438fb1031", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.451637458Z"}, "alertInfo": {"alertId": "37a14544-fd7b-4640-b435-d17438fb1031", "alertFirstOccurred": "2025-11-27T05:20:27.451637458Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:80, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.451637], [_time:2025-11-27T05:20:27.441+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:d4e49f6d-4ab7-45d7-8494-3411c0536f92, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:181487, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "d4e49f6d-4ab7-45d7-8494-3411c0536f92", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.441735574Z"}, "alertInfo": {"alertId": "d4e49f6d-4ab7-45d7-8494-3411c0536f92", "alertFirstOccurred": "2025-11-27T05:20:27.441735574Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:81, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.441735], [_time:2025-11-27T05:20:27.438+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:e89a474a-d0ab-4f29-84a3-637a629e2ff1, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:Keyless-Sigstore-Matching, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:200637, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "e89a474a-d0ab-4f29-84a3-637a629e2ff1", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.438323097Z"}, "alertInfo": {"alertId": "e89a474a-d0ab-4f29-84a3-637a629e2ff1", "alertFirstOccurred": "2025-11-27T05:20:27.438323097Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "cc4e8a90-a1c6-47e4-bafe-18437d518d0c", "policyName": "Keyless-Sigstore-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:82, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.438323], [_time:2025-11-27T05:20:27.210+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677)., id:1bb92401-9b77-4bde-8581-47274cc62ee1, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-distroless, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:23288, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "1bb92401-9b77-4bde-8581-47274cc62ee1", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.210865101Z"}, "alertInfo": {"alertId": "1bb92401-9b77-4bde-8581-47274cc62ee1", "alertFirstOccurred": "2025-11-27T05:20:27.210865101Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:83, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.210865], [_time:2025-11-27T05:20:27.210+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677)., id:9a751e9a-8ad6-409e-899a-553f5522034c, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-distroless, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:132008, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "9a751e9a-8ad6-409e-899a-553f5522034c", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.210687497Z"}, "alertInfo": {"alertId": "9a751e9a-8ad6-409e-899a-553f5522034c", "alertFirstOccurred": "2025-11-27T05:20:27.210687497Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:84, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.210687], [_time:2025-11-27T05:20:27.210+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677)., id:3fedb1d2-fee3-4c8d-aeb9-fc82f3d81e1b, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BOYPKI-Wildcard+Tekton, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-distroless, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:53109, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "3fedb1d2-fee3-4c8d-aeb9-fc82f3d81e1b", "violationMessage": "Container 'with-signature-verified-by-distroless' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14 and io.stackrox.signatureintegration.457681cc-7a5b-47eb-826e-57fb70ebd677).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.210666506Z"}, "alertInfo": {"alertId": "3fedb1d2-fee3-4c8d-aeb9-fc82f3d81e1b", "alertFirstOccurred": "2025-11-27T05:20:27.210666506Z"}, "deploymentInfo": {"deploymentId": "f041f54e-848c-4735-ad58-355528feda4f", "deploymentName": "with-signature-verified-by-distroless", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-distroless-test", "name": "with-signature-verified-by-distroless"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "distroless-base-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:distroless-base-multiarch@sha256:bc217643f9c04fc8131878d6440dd88cf4444385d45bb25995c8051c29687766"}}, "name": "with-signature-verified-by-distroless"}]}, "policyInfo": {"policyId": "5b5e6e53-135f-4075-bfea-7ff7b402ef07", "policyName": "BOYPKI-Wildcard+Tekton", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:85, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.210666], [_time:2025-11-27T05:20:27.195+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'without-signature' image signature is not verified by the specified signature integration(s)., id:aaed267e-b60e-4ec5-b6fe-f3a55c42ac9d, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:147358, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "aaed267e-b60e-4ec5-b6fe-f3a55c42ac9d", "violationMessage": "Container 'without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.195867492Z"}, "alertInfo": {"alertId": "aaed267e-b60e-4ec5-b6fe-f3a55c42ac9d", "alertFirstOccurred": "2025-11-27T05:20:27.195867492Z"}, "deploymentInfo": {"deploymentId": "bf383464-bddb-4a9b-92b7-48ca327715fc", "deploymentName": "without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-without-signature", "name": "without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:b73f527d86e3461fd652f62cf47e7b375196063bbbd503e853af5be16597cb2e"}}, "name": "without-signature"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:86, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.195867], [_time:2025-11-27T05:20:27.187+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644)., id:81a775e4-8360-4aec-a30b-e9610cd92ddd, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:111536, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "81a775e4-8360-4aec-a30b-e9610cd92ddd", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.187610255Z"}, "alertInfo": {"alertId": "81a775e4-8360-4aec-a30b-e9610cd92ddd", "alertFirstOccurred": "2025-11-27T05:20:27.187610255Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:87, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.187610], [_time:2025-11-27T05:20:27.187+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644)., id:7135c7d1-2f72-4822-acd0-5c70843d767d, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:keyless-rhtas, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:97129, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7135c7d1-2f72-4822-acd0-5c70843d767d", "violationMessage": "Container 'keyless-rhtas' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.d831c67d-c3da-4b19-a505-f0b5c31b0644).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.187382960Z"}, "alertInfo": {"alertId": "7135c7d1-2f72-4822-acd0-5c70843d767d", "alertFirstOccurred": "2025-11-27T05:20:27.187382960Z"}, "deploymentInfo": {"deploymentId": "f7956f52-04f2-4ba2-bd48-ba9508fb19c1", "deploymentName": "keyless-rhtas", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-rhtas", "name": "keyless-rhtas"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless@sha256:e246aa22ad2cbdfbd19e2a6ca2b275e26245a21920e2b2d0666324cee3f15549"}}, "name": "keyless-rhtas"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:88, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.187382], [_time:2025-11-27T05:20:27.186+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c)., id:3db5046a-2bb4-4646-904f-e8fd6a170dff, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-tekton, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:51340, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "3db5046a-2bb4-4646-904f-e8fd6a170dff", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.186180503Z"}, "alertInfo": {"alertId": "3db5046a-2bb4-4646-904f-e8fd6a170dff", "alertFirstOccurred": "2025-11-27T05:20:27.186180503Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:89, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.186180], [_time:2025-11-27T05:20:27.186+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c)., id:25ee9154-b579-441d-8d87-32410cb28fe6, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-verified-by-tekton, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:31540, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "25ee9154-b579-441d-8d87-32410cb28fe6", "violationMessage": "Container 'with-signature-verified-by-tekton' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.0a1373b9-0696-4a4d-a2cc-bbbd680c2b14, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.8bcf7a4c-1ed5-4c03-829e-a8a4a6e3c43c).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.186124431Z"}, "alertInfo": {"alertId": "25ee9154-b579-441d-8d87-32410cb28fe6", "alertFirstOccurred": "2025-11-27T05:20:27.186124431Z"}, "deploymentInfo": {"deploymentId": "1a705c9e-f503-46d5-bb1f-71e046c72caf", "deploymentName": "with-signature-verified-by-tekton", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-signature-tekton-test", "name": "with-signature-verified-by-tekton"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "tekton-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:tekton-multiarch@sha256:d12d420438235ccee3f4fcb72cf9e5b2b79f60f713595fe1ada254d10167dfc6"}}, "name": "with-signature-verified-by-tekton"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:90, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.186124], [_time:2025-11-27T05:20:27.176+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:fe23f461-e915-4b27-aede-21467bd2b54c, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:221911, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "fe23f461-e915-4b27-aede-21467bd2b54c", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.176264768Z"}, "alertInfo": {"alertId": "fe23f461-e915-4b27-aede-21467bd2b54c", "alertFirstOccurred": "2025-11-27T05:20:27.176264768Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:91, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.176264], [_time:2025-11-27T05:20:27.176+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s)., id:0e8c01bb-3851-4032-b01d-8bab2b59e7a0, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Unverifiable, src:remote/qa-signature-tests/Deployment:same-digest-without-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:11123, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "0e8c01bb-3851-4032-b01d-8bab2b59e7a0", "violationMessage": "Container 'same-digest-without-signature' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.176184526Z"}, "alertInfo": {"alertId": "0e8c01bb-3851-4032-b01d-8bab2b59e7a0", "alertFirstOccurred": "2025-11-27T05:20:27.176184526Z"}, "deploymentInfo": {"deploymentId": "2534421c-651f-415a-be70-43d6537a3e0c", "deploymentName": "same-digest-without-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-without-signature", "name": "same-digest-without-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-multi-arch", "fullName": "quay.io/rhacs-eng/qa-multi-arch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-without-signature"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:92, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.176184], [_time:2025-11-27T05:20:27.152+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1)., id:5008d193-d108-44c0-a420-8b75d2c5f166, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:keyless-sigstore, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:65981, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "5008d193-d108-44c0-a420-8b75d2c5f166", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.152867359Z"}, "alertInfo": {"alertId": "5008d193-d108-44c0-a420-8b75d2c5f166", "alertFirstOccurred": "2025-11-27T05:20:27.152867359Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:93, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.152867], [_time:2025-11-27T05:20:27.148+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf)., id:a435d8c0-d17a-4be0-a952-081ce83ea2f4, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:same-digest-with-signature, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:141776, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "a435d8c0-d17a-4be0-a952-081ce83ea2f4", "violationMessage": "Container 'same-digest-with-signature' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.62f6c38c-2cfd-46ef-af82-a39585d662bf).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.148085921Z"}, "alertInfo": {"alertId": "a435d8c0-d17a-4be0-a952-081ce83ea2f4", "alertFirstOccurred": "2025-11-27T05:20:27.148085921Z"}, "deploymentInfo": {"deploymentId": "099476ce-06dd-4e31-b41f-9bbc26c3aa7d", "deploymentName": "same-digest-with-signature", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-same-digest-with-signature", "name": "same-digest-with-signature"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "nginx-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:nginx-multiarch@sha256:dd2d0ac3fff2f007d99e033b64854be0941e19a2ad51f174d9240dda20d9f534"}}, "name": "same-digest-with-signature"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:94, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.148085], [_time:2025-11-27T05:20:27.122+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:7f2cf865-1891-4cd6-bb6a-3b5d9d7f5aa2, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Matching, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:109496, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7f2cf865-1891-4cd6-bb6a-3b5d9d7f5aa2", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:27.122529982Z"}, "alertInfo": {"alertId": "7f2cf865-1891-4cd6-bb6a-3b5d9d7f5aa2", "alertFirstOccurred": "2025-11-27T05:20:27.122529982Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "07d5ca71-d808-498e-8167-6dc0fe61b1e9", "policyName": "BYOPKI-Matching", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:95, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.122529], [_time:2025-11-27T05:20:26.914+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:7e3f251b-e0a7-4efe-9e89-fd30756608d3, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Wildcard, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:108723, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "7e3f251b-e0a7-4efe-9e89-fd30756608d3", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.914301561Z"}, "alertInfo": {"alertId": "7e3f251b-e0a7-4efe-9e89-fd30756608d3", "alertFirstOccurred": "2025-11-27T05:20:26.914301561Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "8a3c16fa-6248-4d63-988a-b237783fd792", "policyName": "BYOPKI-Wildcard", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:96, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.914301], [_time:2025-11-27T05:20:26.913+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s)., id:09883ec9-2d54-4dce-812e-dcf50780edff, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Unverifiable, src:remote/qa-signature-tests/Deployment:with-signature-unverifiable, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:7332, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "09883ec9-2d54-4dce-812e-dcf50780edff", "violationMessage": "Container 'with-signature-unverifiable' image signature is not verified by the specified signature integration(s).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.913955884Z"}, "alertInfo": {"alertId": "09883ec9-2d54-4dce-812e-dcf50780edff", "alertFirstOccurred": "2025-11-27T05:20:26.913955884Z"}, "deploymentInfo": {"deploymentId": "7be39da9-d620-4d10-b10e-54dcb79a4d6e", "deploymentName": "with-signature-unverifiable", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-unverifiable-signature-test", "name": "with-signature-unverifiable"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "centos9-multiarch", "fullName": "quay.io/rhacs-eng/qa-signatures:centos9-multiarch@sha256:743cf31b5c29c227aa1371eddd9f9313b2a0487f39ccfc03ec5c89a692c4a0c7"}}, "name": "with-signature-unverifiable"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:97, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.913955], [_time:2025-11-27T05:20:26.908+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043)., id:98769e66-109b-4b78-82c4-2b1463967994, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Unverifiable, src:remote/qa-signature-tests/Deployment:byopki, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:130594, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "98769e66-109b-4b78-82c4-2b1463967994", "violationMessage": "Container 'byopki' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.30091078-e614-4da1-8c89-1c4f268eb2d3, io.stackrox.signatureintegration.4f4f84af-fdcc-4908-b203-783388b617da, and io.stackrox.signatureintegration.f0b9c549-9d9e-4368-bb4f-6999b483b043).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.908690065Z"}, "alertInfo": {"alertId": "98769e66-109b-4b78-82c4-2b1463967994", "alertFirstOccurred": "2025-11-27T05:20:26.908690065Z"}, "deploymentInfo": {"deploymentId": "3b8192bd-9431-4b70-9b72-4aeb242e23ed", "deploymentName": "byopki", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-byopki", "name": "byopki"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "byopki", "fullName": "quay.io/rhacs-eng/qa-signatures:byopki@sha256:7b3ccabffc97de872a30dfd234fd972a66d247c8cfc69b0550f276481852627c"}}, "name": "byopki"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:98, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.908690], [_time:2025-11-27T05:20:26.899+00:00, host:$decideOnStartup, source:stackrox_violations://stackrox-violations-input, sourcetype:stackrox-violations, description:Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1)., id:843c4c24-e382-4b48-bbe5-c4a08ca793b1, src_type:Deployment, app:stackrox, dest:unknown, severity:medium, signature_id:BYOPKI-Unverifiable, src:remote/qa-signature-tests/Deployment:keyless-sigstore, type:alert, user:unknown, user_name:unknown, _bkt:main~0~74DC2AC6-5024-4D35-AD84-BEBB5B75238D, _cd:0:113865, _indextime:1764221085, _raw:{"violationInfo": {"violationId": "843c4c24-e382-4b48-bbe5-c4a08ca793b1", "violationMessage": "Container 'keyless-sigstore' image signature is not verified by the specified signature integration(s) (it is verified by other integration(s): io.stackrox.signatureintegration.46e77716-cf26-4349-8999-5e7b66fa21f1).", "violationType": "GENERIC", "violationTime": "2025-11-27T05:20:26.899526807Z"}, "alertInfo": {"alertId": "843c4c24-e382-4b48-bbe5-c4a08ca793b1", "alertFirstOccurred": "2025-11-27T05:20:26.899526807Z"}, "deploymentInfo": {"deploymentId": "82db372b-66d5-41cd-ab1a-775e519cd7ce", "deploymentName": "keyless-sigstore", "deploymentType": "Deployment", "deploymentNamespace": "qa-signature-tests", "deploymentNamespaceId": "52335812-e679-49fb-9e73-02ba3925f980", "deploymentLabels": {"app": "image-with-keyless-sigstore", "name": "keyless-sigstore"}, "clusterId": "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101", "clusterName": "remote", "deploymentContainers": [{"image": {"id": "sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f", "name": {"registry": "quay.io", "remote": "rhacs-eng/qa-signatures", "tag": "keyless-sigstore", "fullName": "quay.io/rhacs-eng/qa-signatures:keyless-sigstore@sha256:37f7b378a29ceb4c551b1b5582e27747b855bbfaa73fa11914fe0df028dc581f"}}, "name": "keyless-sigstore"}]}, "policyInfo": {"policyId": "af1a149f-117d-4740-8d19-fdc3d7b61355", "policyName": "BYOPKI-Unverifiable", "policyCategories": ["Test"], "policyLifecycleStages": ["DEPLOY"], "policySeverity": "MEDIUM_SEVERITY", "policyVersion": "1.1"}}, _serial:99, _si:[splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9-5965848765-88gr6, main], _sourcetype:stackrox-violations, _subsecond:.899526]] 05:26:14 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Current Splunk index contains any Network Alert: true and any Process Alert: true 05:26:14 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Validating CIM mappings for alerts 05:26:21 | DEBUG | IntegrationsSplunkViolati | Kubernetes | splunk-syslog-30b0ad59-2cd5-40b1-8620-213024e4cea9: Service deleting... 05:26:21 | DEBUG | IntegrationsSplunkViolati | Kubernetes | splunk-syslog-30b0ad59-2cd5-40b1-8620-213024e4cea9: Service deleted 05:26:21 | DEBUG | IntegrationsSplunkViolati | Kubernetes | splunk-collector-30b0ad59-2cd5-40b1-8620-213024e4cea9: Service deleting... 05:26:21 | DEBUG | IntegrationsSplunkViolati | Kubernetes | splunk-collector-30b0ad59-2cd5-40b1-8620-213024e4cea9: Service deleted 05:26:21 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Removed the deployment: splunk-30b0ad59-2cd5-40b1-8620-213024e4cea9 05:26:21 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Ending testcase IntegrationsSplunkViolationsTest > Verify Splunk violations: StackRox violations reach Splunk TA PASSED IntegrationsSplunkViolationsTest STANDARD_OUT 05:26:21 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Waiting for namespace qa-splunk to be deleted 05:26:21 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:26:24 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:26:27 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:26:30 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:26:33 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:26:36 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:26:39 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:26:42 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:26:45 | DEBUG | IntegrationsSplunkViolati | Kubernetes | Retrying in 3... 05:26:49 | DEBUG | IntegrationsSplunkViolati | Kubernetes | K8s found that namespace qa-splunk was deleted 05:26:49 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Ending testsuite 05:26:49 | INFO | IntegrationsSplunkViolati | IntegrationsSplunkViolati | Checking if cluster is healthy after test 05:26:49 | DEBUG | IntegrationsSplunkViolati | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries IntegrationsTest STANDARD_OUT 05:26:49 | INFO | IntegrationsTest | IntegrationsTest | Starting testsuite 05:26:49 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:26:49 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace netpol-notification-test-deployment 05:26:49 | DEBUG | IntegrationsTest | Kubernetes | Waiting for netpol-notification-test-deployment to start 05:26:49 | DEBUG | IntegrationsTest | Kubernetes | Status of netpol-notification-test-deployment's pods: 05:26:49 | DEBUG | IntegrationsTest | Kubernetes | - netpol-notification-test-deployment-86c44587f-rnz7p Container status: [] 05:26:49 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for netpol-notification-test-deployment 05:26:52 | DEBUG | IntegrationsTest | Kubernetes | Waiting for netpol-notification-test-deployment to start 05:26:52 | DEBUG | IntegrationsTest | Kubernetes | Status of netpol-notification-test-deployment's pods: 05:26:52 | DEBUG | IntegrationsTest | Kubernetes | - netpol-notification-test-deployment-86c44587f-rnz7p Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:26:50Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:26:52 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for netpol-notification-test-deployment 05:26:52 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment netpol-notification-test-deployment 05:26:52 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment netpol-notification-test-deployment with 1 pods 05:26:52 | INFO | IntegrationsTest | Services | SR found deployment netpol-notification-test-deployment within 0s IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=true, sendCreds=true) STANDARD_OUT 05:26:52 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=true, sendCreds=true) 05:26:52 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:26:52 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace maildev-16205117-3b43-4719-9b75-685f566c8ee9 05:26:52 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-16205117-3b43-4719-9b75-685f566c8ee9 to start 05:26:52 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-16205117-3b43-4719-9b75-685f566c8ee9's pods: 05:26:52 | DEBUG | IntegrationsTest | Kubernetes | - maildev-16205117-3b43-4719-9b75-685f566c8ee9-5fd556f747-pq7b4 Container status: [] 05:26:52 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for maildev-16205117-3b43-4719-9b75-685f566c8ee9 05:26:55 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-16205117-3b43-4719-9b75-685f566c8ee9 to start 05:26:55 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-16205117-3b43-4719-9b75-685f566c8ee9's pods: 05:26:55 | DEBUG | IntegrationsTest | Kubernetes | - maildev-16205117-3b43-4719-9b75-685f566c8ee9-5fd556f747-pq7b4 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:26:53Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:26:55 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for maildev-16205117-3b43-4719-9b75-685f566c8ee9 05:26:55 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment maildev-16205117-3b43-4719-9b75-685f566c8ee9 05:26:55 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment maildev-16205117-3b43-4719-9b75-685f566c8ee9 with 1 pods 05:26:55 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-16205117-3b43-4719-9b75-685f566c8ee9: Service created 05:26:55 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-16205117-3b43-4719-9b75-685f566c8ee9: Service created 05:27:25 | INFO | IntegrationsTest | IntegrationsTest | Found email with body: This is a test email created to test integration with StackRox. 05:27:25 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-16205117-3b43-4719-9b75-685f566c8ee9: Service deleting... 05:27:25 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-16205117-3b43-4719-9b75-685f566c8ee9: Service deleted 05:27:25 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-16205117-3b43-4719-9b75-685f566c8ee9: Service deleting... 05:27:25 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-16205117-3b43-4719-9b75-685f566c8ee9: Service deleted 05:27:25 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-smtp-16205117-3b43-4719-9b75-685f566c8ee9 to be deleted 05:27:25 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-16205117-3b43-4719-9b75-685f566c8ee9: service removed. 05:27:25 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-web-16205117-3b43-4719-9b75-685f566c8ee9 to be deleted 05:27:25 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-16205117-3b43-4719-9b75-685f566c8ee9: service removed. 05:27:25 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: maildev-16205117-3b43-4719-9b75-685f566c8ee9 05:27:25 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=true, sendCreds=true) PASSED IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=true, sendCreds=false) STANDARD_OUT 05:27:25 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=true, sendCreds=false) 05:27:26 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:27:26 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace maildev-f2ce892a-9007-4fa5-9a17-e3d759f2daf3 05:27:26 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-f2ce892a-9007-4fa5-9a17-e3d759f2daf3 to start 05:27:26 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-f2ce892a-9007-4fa5-9a17-e3d759f2daf3's pods: 05:27:26 | DEBUG | IntegrationsTest | Kubernetes | - maildev-f2ce892a-9007-4fa5-9a17-e3d759f2daf3-5bcf44bf9-4x9sl Container status: [] 05:27:26 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for maildev-f2ce892a-9007-4fa5-9a17-e3d759f2daf3 05:27:29 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-f2ce892a-9007-4fa5-9a17-e3d759f2daf3 to start 05:27:29 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-f2ce892a-9007-4fa5-9a17-e3d759f2daf3's pods: 05:27:29 | DEBUG | IntegrationsTest | Kubernetes | - maildev-f2ce892a-9007-4fa5-9a17-e3d759f2daf3-5bcf44bf9-4x9sl Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:27:26Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:27:29 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for maildev-f2ce892a-9007-4fa5-9a17-e3d759f2daf3 05:27:29 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment maildev-f2ce892a-9007-4fa5-9a17-e3d759f2daf3 05:27:29 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment maildev-f2ce892a-9007-4fa5-9a17-e3d759f2daf3 with 1 pods 05:27:29 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-f2ce892a-9007-4fa5-9a17-e3d759f2daf3: Service created 05:27:29 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-f2ce892a-9007-4fa5-9a17-e3d759f2daf3: Service created 05:27:59 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments 05:28:00 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments 05:28:01 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments 05:28:02 | ERROR | IntegrationsTest | NotifierService | error testing notifier io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments at io.stackrox.proto.api.v1.NotifierServiceGrpc$NotifierServiceBlockingStub.testNotifier(NotifierServiceGrpc.java:573) [3 skipped] at services.NotifierService$_testNotifier_closure2.doCall(NotifierService.groovy:42) at services.NotifierService$_testNotifier_closure2.call(NotifierService.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at util.Helpers.withRetry(Helpers.groovy:42) at services.NotifierService.testNotifier(NotifierService.groovy:41) at objects.Notifier.testNotifier(Notifiers.groovy:30) [1 skipped] at IntegrationsTest.$spock_feature_1_0(IntegrationsTest.groovy:86) [13 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-f2ce892a-9007-4fa5-9a17-e3d759f2daf3: Service deleting... 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-f2ce892a-9007-4fa5-9a17-e3d759f2daf3: Service deleted 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-f2ce892a-9007-4fa5-9a17-e3d759f2daf3: Service deleting... 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-f2ce892a-9007-4fa5-9a17-e3d759f2daf3: Service deleted 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-smtp-f2ce892a-9007-4fa5-9a17-e3d759f2daf3 to be deleted 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-f2ce892a-9007-4fa5-9a17-e3d759f2daf3: service removed. 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-web-f2ce892a-9007-4fa5-9a17-e3d759f2daf3 to be deleted 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-f2ce892a-9007-4fa5-9a17-e3d759f2daf3: service removed. 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: maildev-f2ce892a-9007-4fa5-9a17-e3d759f2daf3 05:28:02 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=true, sendCreds=false) PASSED IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=false, sendCreds=false) STANDARD_OUT 05:28:02 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=false, sendCreds=false) 05:28:02 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace maildev-afc05f6d-b42c-4125-a37d-ef1bbd64775e 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-afc05f6d-b42c-4125-a37d-ef1bbd64775e to start 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-afc05f6d-b42c-4125-a37d-ef1bbd64775e's pods: 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | - maildev-afc05f6d-b42c-4125-a37d-ef1bbd64775e-7f54689dd6-7l7tz Container status: [] 05:28:02 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for maildev-afc05f6d-b42c-4125-a37d-ef1bbd64775e 05:28:05 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-afc05f6d-b42c-4125-a37d-ef1bbd64775e to start 05:28:05 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-afc05f6d-b42c-4125-a37d-ef1bbd64775e's pods: 05:28:05 | DEBUG | IntegrationsTest | Kubernetes | - maildev-afc05f6d-b42c-4125-a37d-ef1bbd64775e-7f54689dd6-7l7tz Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:28:03Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:28:05 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for maildev-afc05f6d-b42c-4125-a37d-ef1bbd64775e 05:28:05 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment maildev-afc05f6d-b42c-4125-a37d-ef1bbd64775e 05:28:05 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment maildev-afc05f6d-b42c-4125-a37d-ef1bbd64775e with 1 pods 05:28:06 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-afc05f6d-b42c-4125-a37d-ef1bbd64775e: Service created 05:28:06 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-afc05f6d-b42c-4125-a37d-ef1bbd64775e: Service created 05:28:36 | INFO | IntegrationsTest | IntegrationsTest | Found email with body: This is a test email created to test integration with StackRox. 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-afc05f6d-b42c-4125-a37d-ef1bbd64775e: Service deleting... 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-afc05f6d-b42c-4125-a37d-ef1bbd64775e: Service deleted 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-afc05f6d-b42c-4125-a37d-ef1bbd64775e: Service deleting... 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-afc05f6d-b42c-4125-a37d-ef1bbd64775e: Service deleted 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-smtp-afc05f6d-b42c-4125-a37d-ef1bbd64775e to be deleted 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-afc05f6d-b42c-4125-a37d-ef1bbd64775e: service removed. 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-web-afc05f6d-b42c-4125-a37d-ef1bbd64775e to be deleted 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-afc05f6d-b42c-4125-a37d-ef1bbd64775e: service removed. 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: maildev-afc05f6d-b42c-4125-a37d-ef1bbd64775e 05:28:36 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=false, sendCreds=false) PASSED IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=false, sendCreds=true) STANDARD_OUT 05:28:36 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=false, sendCreds=true) 05:28:36 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace maildev-c21c47ef-a450-4c48-8158-a12024acf81b 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-c21c47ef-a450-4c48-8158-a12024acf81b to start 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-c21c47ef-a450-4c48-8158-a12024acf81b's pods: 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | - maildev-c21c47ef-a450-4c48-8158-a12024acf81b-7f65cbbff8-xltgf Container status: [] 05:28:36 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for maildev-c21c47ef-a450-4c48-8158-a12024acf81b 05:28:39 | DEBUG | IntegrationsTest | Kubernetes | Waiting for maildev-c21c47ef-a450-4c48-8158-a12024acf81b to start 05:28:39 | DEBUG | IntegrationsTest | Kubernetes | Status of maildev-c21c47ef-a450-4c48-8158-a12024acf81b's pods: 05:28:39 | DEBUG | IntegrationsTest | Kubernetes | - maildev-c21c47ef-a450-4c48-8158-a12024acf81b-7f65cbbff8-xltgf Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:28:37Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:28:39 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for maildev-c21c47ef-a450-4c48-8158-a12024acf81b 05:28:39 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment maildev-c21c47ef-a450-4c48-8158-a12024acf81b 05:28:39 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment maildev-c21c47ef-a450-4c48-8158-a12024acf81b with 1 pods 05:28:39 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-c21c47ef-a450-4c48-8158-a12024acf81b: Service created 05:28:39 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-c21c47ef-a450-4c48-8158-a12024acf81b: Service created 05:29:09 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments 05:29:10 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments 05:29:12 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments 05:29:13 | ERROR | IntegrationsTest | NotifierService | error testing notifier io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test email failed: invalid arguments at io.stackrox.proto.api.v1.NotifierServiceGrpc$NotifierServiceBlockingStub.testNotifier(NotifierServiceGrpc.java:573) [3 skipped] at services.NotifierService$_testNotifier_closure2.doCall(NotifierService.groovy:42) at services.NotifierService$_testNotifier_closure2.call(NotifierService.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at util.Helpers.withRetry(Helpers.groovy:42) at services.NotifierService.testNotifier(NotifierService.groovy:41) at objects.Notifier.testNotifier(Notifiers.groovy:30) [1 skipped] at IntegrationsTest.$spock_feature_1_0(IntegrationsTest.groovy:86) [13 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:29:13 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-c21c47ef-a450-4c48-8158-a12024acf81b: Service deleting... 05:29:13 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-c21c47ef-a450-4c48-8158-a12024acf81b: Service deleted 05:29:13 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-c21c47ef-a450-4c48-8158-a12024acf81b: Service deleting... 05:29:13 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-c21c47ef-a450-4c48-8158-a12024acf81b: Service deleted 05:29:13 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-smtp-c21c47ef-a450-4c48-8158-a12024acf81b to be deleted 05:29:13 | DEBUG | IntegrationsTest | Kubernetes | maildev-smtp-c21c47ef-a450-4c48-8158-a12024acf81b: service removed. 05:29:13 | DEBUG | IntegrationsTest | Kubernetes | Waiting for service maildev-web-c21c47ef-a450-4c48-8158-a12024acf81b to be deleted 05:29:13 | DEBUG | IntegrationsTest | Kubernetes | maildev-web-c21c47ef-a450-4c48-8158-a12024acf81b: service removed. 05:29:13 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: maildev-c21c47ef-a450-4c48-8158-a12024acf81b 05:29:13 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Email Integration (disableTLS=#disableTLS, startTLS=#startTLS, authenticated=#authenticated, sendCreds=#sendCreds) > Verify create Email Integration (disableTLS=true, startTLS=DISABLED, authenticated=false, sendCreds=true) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (no TLS, audit=false) STANDARD_OUT 05:29:13 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (no TLS, audit=false) 05:29:13 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (no TLS, audit=false) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, no verify, audit=false) STANDARD_OUT 05:29:13 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (TLS, no verify, audit=false) 05:29:13 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, no verify, audit=false) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify custom CA, audit=false) STANDARD_OUT 05:29:13 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (TLS, verify custom CA, audit=false) 05:29:13 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify custom CA, audit=false) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify system CA, audit=false) STANDARD_OUT 05:29:13 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (TLS, verify system CA, audit=false) 05:29:13 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments 05:29:14 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments 05:29:15 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments 05:29:16 | ERROR | IntegrationsTest | NotifierService | error testing notifier io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments at io.stackrox.proto.api.v1.NotifierServiceGrpc$NotifierServiceBlockingStub.testNotifier(NotifierServiceGrpc.java:573) [3 skipped] at services.NotifierService$_testNotifier_closure2.doCall(NotifierService.groovy:42) at services.NotifierService$_testNotifier_closure2.call(NotifierService.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at util.Helpers.withRetry(Helpers.groovy:42) at services.NotifierService.testNotifier(NotifierService.groovy:41) at objects.Notifier.testNotifier(Notifiers.groovy:30) [1 skipped] at IntegrationsTest.$spock_feature_1_1(IntegrationsTest.groovy:165) [13 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:29:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify system CA, audit=false) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (no TLS, audit=true) STANDARD_OUT 05:29:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (no TLS, audit=true) 05:29:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (no TLS, audit=true) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, no verify, audit=true) STANDARD_OUT 05:29:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (TLS, no verify, audit=true) 05:29:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, no verify, audit=true) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify custom CA, audit=true) STANDARD_OUT 05:29:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (TLS, verify custom CA, audit=true) 05:29:16 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify custom CA, audit=true) PASSED IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify system CA, audit=true) STANDARD_OUT 05:29:16 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify create Generic Integration Test Endpoint (TLS, verify system CA, audit=true) 05:29:16 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments 05:29:17 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments 05:29:18 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 3): io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments 05:29:19 | ERROR | IntegrationsTest | NotifierService | error testing notifier io.grpc.StatusRuntimeException: INVALID_ARGUMENT: send test message failed: invalid arguments at io.stackrox.proto.api.v1.NotifierServiceGrpc$NotifierServiceBlockingStub.testNotifier(NotifierServiceGrpc.java:573) [3 skipped] at services.NotifierService$_testNotifier_closure2.doCall(NotifierService.groovy:42) at services.NotifierService$_testNotifier_closure2.call(NotifierService.groovy) at util.Helpers.evaluateWithRetry(Helpers.groovy:38) at util.Helpers.withRetry(Helpers.groovy:42) at services.NotifierService.testNotifier(NotifierService.groovy:41) at objects.Notifier.testNotifier(Notifiers.groovy:30) [1 skipped] at IntegrationsTest.$spock_feature_1_1(IntegrationsTest.groovy:165) [13 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:29:19 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify create Generic Integration Test Endpoint (#tlsOptsDesc, audit=#auditLoggingEnabled) > Verify create Generic Integration Test Endpoint (TLS, verify system CA, audit=true) PASSED IntegrationsTest > Verify Splunk Integration STANDARD_OUT 05:29:19 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Splunk Integration 05:29:19 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:29:19 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace splunk-504450d3-780b-4368-b682-9ed9ebd9f70f 05:29:19 | DEBUG | IntegrationsTest | Kubernetes | Waiting for splunk-504450d3-780b-4368-b682-9ed9ebd9f70f to start 05:29:19 | DEBUG | IntegrationsTest | Kubernetes | Status of splunk-504450d3-780b-4368-b682-9ed9ebd9f70f's pods: 05:29:19 | DEBUG | IntegrationsTest | Kubernetes | - splunk-504450d3-780b-4368-b682-9ed9ebd9f70f-58c9c77dc6-wshnl Container status: [] 05:29:19 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for splunk-504450d3-780b-4368-b682-9ed9ebd9f70f 05:29:22 | DEBUG | IntegrationsTest | Kubernetes | Waiting for splunk-504450d3-780b-4368-b682-9ed9ebd9f70f to start 05:29:23 | DEBUG | IntegrationsTest | Kubernetes | Status of splunk-504450d3-780b-4368-b682-9ed9ebd9f70f's pods: 05:29:23 | DEBUG | IntegrationsTest | Kubernetes | - splunk-504450d3-780b-4368-b682-9ed9ebd9f70f-58c9c77dc6-wshnl Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:29:20Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:29:23 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for splunk-504450d3-780b-4368-b682-9ed9ebd9f70f 05:29:23 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment splunk-504450d3-780b-4368-b682-9ed9ebd9f70f 05:29:23 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment splunk-504450d3-780b-4368-b682-9ed9ebd9f70f with 1 pods 05:29:23 | DEBUG | IntegrationsTest | Kubernetes | splunk-collector-504450d3-780b-4368-b682-9ed9ebd9f70f: Service created 05:29:23 | DEBUG | IntegrationsTest | Kubernetes | splunk-syslog-504450d3-780b-4368-b682-9ed9ebd9f70f: Service created 05:29:23 | INFO | IntegrationsTest | SplunkUtil | Waiting for Splunk to boot... 05:29:23 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 10s (attempt 0 of 30): javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake 05:29:33 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 10s (attempt 1 of 30): javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake 05:29:43 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 10s (attempt 2 of 30): javax.net.ssl.SSLHandshakeException: Remote host terminated the handshake 05:29:53 | DEBUG | IntegrationsTest | SplunkUtil | Splunkd status: {"links":{},"origin":"https://127.0.0.1:42469/services/server/health","updated":"2025-11-27T05:29:53+00:00","generator":{"build":"e9494146ae5c","version":"9.0.5"},"entry":[{"name":"splunkd","id":"https://127.0.0.1:42469/services/server/health/splunkd","updated":"1970-01-01T00:00:00+00:00","links":{"alternate":"/services/server/health/splunkd","list":"/services/server/health/splunkd"},"author":"system","acl":{"app":"","can_list":true,"can_write":true,"modifiable":false,"owner":"system","perms":{"read":["admin","splunk-system-role"],"write":[]},"removable":false,"sharing":"system"},"content":{"eai:acl":null,"features":{"File Monitor Input":{"features":{"Forwarder Ingestion Latency":{"health":"green"},"Ingestion Latency":{"health":"green"},"Large and Archive File Reader-0":{"health":"green"},"Real-time Reader-0":{"health":"green"}},"health":"green"},"Index Processor":{"features":{"Buckets":{"health":"green"},"Disk Space":{"health":"green"},"Index Optimization":{"health":"green"}},"health":"green"},"Search Scheduler":{"features":{"Scheduler Suppression":{"health":"green"},"Search Lag":{"health":"green"},"Searches Delayed":{"health":"green"},"Searches Skipped in the last 24 hours":{"health":"green"}},"health":"green"},"Workload Management":{"disabled":true,"health":"green"}},"health":"green"}}],"paging":{"total":1,"perPage":30,"offset":0},"messages":[]} 05:29:53 | INFO | IntegrationsTest | SplunkUtil | Splunk has completed booting 05:29:53 | INFO | IntegrationsTest | SplunkUtil | Attempting to create new HEC ingest token 05:29:53 | INFO | IntegrationsTest | SplunkNotifier | Using HEC ingest token: 783736a1-a0e3-46eb-b77e-ca2a7208fdf0 05:29:53 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:29:54 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:29:54 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace nginx-spl-violation 05:29:54 | DEBUG | IntegrationsTest | Kubernetes | Waiting for nginx-spl-violation to start 05:29:54 | DEBUG | IntegrationsTest | Kubernetes | Status of nginx-spl-violation's pods: 05:29:54 | DEBUG | IntegrationsTest | Kubernetes | - nginx-spl-violation-6767dbb4bd-kcj75 Container status: [] 05:29:54 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for nginx-spl-violation 05:29:57 | DEBUG | IntegrationsTest | Kubernetes | Waiting for nginx-spl-violation to start 05:29:57 | DEBUG | IntegrationsTest | Kubernetes | Status of nginx-spl-violation's pods: 05:29:57 | DEBUG | IntegrationsTest | Kubernetes | - nginx-spl-violation-6767dbb4bd-kcj75 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:29:54Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:29:57 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for nginx-spl-violation 05:29:57 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment nginx-spl-violation 05:29:57 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment nginx-spl-violation with 1 pods 05:29:57 | DEBUG | IntegrationsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:29:57 | INFO | IntegrationsTest | Services | violation size is: 1 05:29:57 | INFO | IntegrationsTest | Services | Latest tag 504450d3-780b-4368-b682-9ed9ebd9f70f triggered after waiting 0 seconds 05:29:57 | INFO | IntegrationsTest | SplunkUtil | Waiting for data to arrive in Splunk for search query: search sourcetype=stackrox-alert Latest tag 504450d3-780b-4368-b682-9ed9ebd9f70f 05:29:57 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221397.1"} 05:29:57 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221397.1 05:29:57 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 0 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:30:12 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221412.3"} 05:30:12 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221412.3 05:30:12 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 1 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:30:28 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221428.5"} 05:30:28 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221428.5 05:30:28 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 2 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:30:43 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221443.6"} 05:30:43 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221443.6 05:30:43 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 3 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:30:58 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221458.7"} 05:30:58 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221458.7 05:30:58 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 4 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:31:14 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221474.8"} 05:31:14 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221474.8 05:31:14 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 5 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:31:29 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221489.9"} 05:31:29 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221489.9 05:31:29 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 6 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:31:44 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221504.10"} 05:31:44 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221504.10 05:31:44 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 7 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:32:00 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221520.11"} 05:32:00 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221520.11 05:32:00 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 8 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:32:15 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221535.12"} 05:32:15 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221535.12 05:32:15 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 9 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:32:30 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221550.13"} 05:32:30 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221550.13 05:32:30 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 10 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:32:46 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221566.14"} 05:32:46 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221566.14 05:32:46 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 11 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:33:01 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221581.15"} 05:33:01 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221581.15 05:33:01 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 12 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:33:16 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221596.16"} 05:33:16 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221596.16 05:33:16 | DEBUG | IntegrationsTest | Helpers | Caught exception. Retrying in 15s (attempt 13 of 40): Assertion failed: assert results.size() > 0 | | | [] 0 false 05:33:32 | DEBUG | IntegrationsTest | SplunkUtil | {"sid":"1764221612.17"} 05:33:32 | DEBUG | IntegrationsTest | SplunkUtil | New Search created: 1764221612.17 05:33:32 | INFO | IntegrationsTest | SplunkUtil | Data arrived in Splunk! 05:33:32 | INFO | IntegrationsTest | SplunkNotifier | Verifying data in Splunk 05:33:32 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: nginx-spl-violation 05:33:32 | DEBUG | IntegrationsTest | Kubernetes | splunk-syslog-504450d3-780b-4368-b682-9ed9ebd9f70f: Service deleting... 05:33:32 | DEBUG | IntegrationsTest | Kubernetes | splunk-syslog-504450d3-780b-4368-b682-9ed9ebd9f70f: Service deleted 05:33:32 | DEBUG | IntegrationsTest | Kubernetes | splunk-collector-504450d3-780b-4368-b682-9ed9ebd9f70f: Service deleting... 05:33:32 | DEBUG | IntegrationsTest | Kubernetes | splunk-collector-504450d3-780b-4368-b682-9ed9ebd9f70f: Service deleted 05:33:32 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: splunk-504450d3-780b-4368-b682-9ed9ebd9f70f 05:33:32 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Splunk Integration PASSED IntegrationsTest > Verify Network Simulator Notifications: #type > Verify Network Simulator Notifications: SLACK STANDARD_OUT 05:33:32 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Network Simulator Notifications: SLACK 05:33:32 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:33:32 | DEBUG | IntegrationsTest | Notifier | Nothing to validate 05:33:32 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Network Simulator Notifications: #type > Verify Network Simulator Notifications: SLACK PASSED IntegrationsTest > Verify Network Simulator Notifications: #type > Verify Network Simulator Notifications: GENERIC STANDARD_OUT 05:33:32 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Network Simulator Notifications: GENERIC 05:33:32 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:33:32 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Network Simulator Notifications: #type > Verify Network Simulator Notifications: GENERIC PASSED IntegrationsTest > Verify Network Simulator Notifications: #type > Verify Network Simulator Notifications: SLACK, GENERIC STANDARD_OUT 05:33:32 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Network Simulator Notifications: SLACK, GENERIC 05:33:32 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:33:32 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:33:33 | DEBUG | IntegrationsTest | Notifier | Nothing to validate 05:33:33 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Network Simulator Notifications: #type > Verify Network Simulator Notifications: SLACK, GENERIC PASSED IntegrationsTest > Verify Policy Violation Notifications: #type > Verify Policy Violation Notifications: GENERIC STANDARD_OUT 05:33:33 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Policy Violation Notifications: GENERIC 05:33:33 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:33:33 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:33:33 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace policy-violation-generic-notification 05:33:33 | DEBUG | IntegrationsTest | Kubernetes | Waiting for policy-violation-generic-notification to start 05:33:33 | DEBUG | IntegrationsTest | Kubernetes | Status of policy-violation-generic-notification's pods: 05:33:33 | DEBUG | IntegrationsTest | Kubernetes | - policy-violation-generic-notification-5cfb968598-4b6wr Container status: [] 05:33:33 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for policy-violation-generic-notification 05:33:36 | DEBUG | IntegrationsTest | Kubernetes | Waiting for policy-violation-generic-notification to start 05:33:36 | DEBUG | IntegrationsTest | Kubernetes | Status of policy-violation-generic-notification's pods: 05:33:36 | DEBUG | IntegrationsTest | Kubernetes | - policy-violation-generic-notification-5cfb968598-4b6wr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:33:34Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:33:36 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for policy-violation-generic-notification 05:33:36 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment policy-violation-generic-notification 05:33:36 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment policy-violation-generic-notification with 1 pods 05:33:36 | INFO | IntegrationsTest | Services | SR found deployment policy-violation-generic-notification within 0s 05:33:36 | DEBUG | IntegrationsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:33:36 | INFO | IntegrationsTest | Services | violation size is: 1 05:33:36 | INFO | IntegrationsTest | Services | Policy Notifier Test Policy triggered after waiting 0 seconds 05:33:36 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: policy-violation-generic-notification 05:33:36 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Policy Violation Notifications: #type > Verify Policy Violation Notifications: GENERIC PASSED IntegrationsTest > Verify Attempted Policy Violation Notifications: #type > Verify Attempted Policy Violation Notifications: GENERIC STANDARD_OUT 05:33:36 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Attempted Policy Violation Notifications: GENERIC 05:33:36 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:33:42 | WARN | IntegrationsTest | Kubernetes | Error creating k8s deployment: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Policy Notifier Test Policy - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'policy-violation-generic-notification' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Policy Notifier Test Policy - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'policy-violation-generic-notification' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.http.StandardHttpClient.lambda$completeOrCancel$10(StandardHttpClient.java:141) [7 skipped] at io.fabric8.kubernetes.client.http.ByteArrayBodyHandler.onBodyDone(ByteArrayBodyHandler.java:51) [4 skipped] at io.fabric8.kubernetes.client.vertx.VertxHttpRequest.lambda$consumeBytes$1(VertxHttpRequest.java:84) [4 skipped] at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:270) at io.vertx.core.impl.ContextInternal.dispatch(ContextInternal.java:252) at io.vertx.core.http.impl.HttpEventHandler.handleEnd(HttpEventHandler.java:76) at io.vertx.core.http.impl.HttpClientResponseImpl.handleEnd(HttpClientResponseImpl.java:250) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.lambda$new$0(Http1xClientConnection.java:424) at io.vertx.core.streams.impl.InboundBuffer.handleEvent(InboundBuffer.java:279) at io.vertx.core.streams.impl.InboundBuffer.write(InboundBuffer.java:157) at io.vertx.core.http.impl.Http1xClientConnection$StreamImpl.handleEnd(Http1xClientConnection.java:734) at io.vertx.core.impl.ContextImpl.lambda$execute$7(ContextImpl.java:329) at io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:173) at io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:166) at io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:472) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:569) at io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:998) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) [1 skipped] ... 1 common frames omitted Wrapped by: io.fabric8.kubernetes.client.KubernetesClientException: Failure executing: POST at: https://api.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com:6443/apis/apps/v1/namespaces/qa/deployments. Message: admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Policy Notifier Test Policy - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'policy-violation-generic-notification' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number . Received status: Status(apiVersion=v1, code=400, details=null, kind=Status, message=admission webhook "policyeval.stackrox.io" denied the request: The attempted operation violated 1 enforced policy, described below: Policy: Policy Notifier Test Policy - Description: ↳ Alert on deployments with images using tag 'latest' - Rationale: ↳ Using latest tag can result in running heterogeneous versions of code. Many Docker hosts cache the Docker images, which means newer versions of the latest tag will not be picked up. See https://docs.docker.com/develop/dev-best-practices for more best practices. - Remediation: ↳ Consider moving to semantic versioning based on code releases (semver.org) or using the first 12 characters of the source control SHA. This will allow you to tie the Docker image to the code. - Violations: - Container 'policy-violation-generic-notification' has image with tag 'latest' In case of emergency, add the annotation {"admission.stackrox.io/break-glass": "ticket-1234"} to your deployment with an updated ticket number , metadata=ListMeta(_continue=null, remainingItemCount=null, resourceVersion=null, selfLink=null, additionalProperties={}), reason=Failed currently enforced policies from RHACS, status=Failure, additionalProperties={}). at io.fabric8.kubernetes.client.KubernetesClientException.copyAsCause(KubernetesClientException.java:205) at io.fabric8.kubernetes.client.utils.internal.CreateOrReplaceHelper.createOrReplace(CreateOrReplaceHelper.java:53) [6 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy:2038) [4 skipped] at orchestratormanager.Kubernetes$_createDeploymentNoWait_closure71.doCall(Kubernetes.groovy) at jdk.internal.reflect.GeneratedMethodAccessor1510.invoke(Unknown Source) at util.Helpers.evaluateWithK8sClientRetry(Helpers.groovy:54) [8 skipped] at util.Helpers.withK8sClientRetry(Helpers.groovy:58) at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy:2037) [1 skipped] at orchestratormanager.Kubernetes.createDeploymentNoWait(Kubernetes.groovy) at IntegrationsTest.$spock_feature_1_5(IntegrationsTest.groovy:430) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:33:42 | DEBUG | IntegrationsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:33:42 | INFO | IntegrationsTest | Services | violation size is: 1 05:33:42 | INFO | IntegrationsTest | Services | Policy Notifier Test Policy triggered after waiting 0 seconds 05:33:42 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Attempted Policy Violation Notifications: #type > Verify Attempted Policy Violation Notifications: GENERIC PASSED IntegrationsTest > Verify external backup errors on external DB SKIPPED IntegrationsTest > Verify AWS S3 Integration: #integrationName > Verify AWS S3 Integration: S3 with endpoint STANDARD_OUT 05:33:42 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify AWS S3 Integration: S3 with endpoint 05:33:42 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify AWS S3 Integration: #integrationName > Verify AWS S3 Integration: S3 with endpoint PASSED IntegrationsTest > Verify AWS S3 Integration: #integrationName > Verify AWS S3 Integration: S3 without endpoint STANDARD_OUT 05:33:42 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify AWS S3 Integration: S3 without endpoint 05:33:42 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify AWS S3 Integration: #integrationName > Verify AWS S3 Integration: S3 without endpoint PASSED IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/path-based/no-prefix STANDARD_OUT 05:33:42 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify S3 Compatible Integration: Cloudflare R2/path-based/no-prefix 05:33:43 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/path-based/no-prefix PASSED IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/path-based/https STANDARD_OUT 05:33:43 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify S3 Compatible Integration: Cloudflare R2/path-based/https 05:33:43 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/path-based/https PASSED IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/virtual-hosted/no-prefix STANDARD_OUT 05:33:43 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify S3 Compatible Integration: Cloudflare R2/virtual-hosted/no-prefix 05:33:43 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/virtual-hosted/no-prefix PASSED IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/virtual-hosted/https STANDARD_OUT 05:33:43 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify S3 Compatible Integration: Cloudflare R2/virtual-hosted/https 05:33:44 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify S3 Compatible Integration: #integrationName > Verify S3 Compatible Integration: Cloudflare R2/virtual-hosted/https PASSED IntegrationsTest > Verify GCS Integration: #integrationName > Verify GCS Integration: GCS with service account key STANDARD_OUT 05:33:44 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify GCS Integration: GCS with service account key 05:33:44 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify GCS Integration: #integrationName > Verify GCS Integration: GCS with service account key PASSED IntegrationsTest > Verify GCS Integration: #integrationName > Verify GCS Integration: GCS with workload identity STANDARD_OUT 05:33:44 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify GCS Integration: GCS with workload identity 05:33:44 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:33:44 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify GCS Integration: #integrationName > Verify GCS Integration: GCS with workload identity SKIPPED IntegrationsTest > Verify Policy Violation Notifications Destination Overrides: #type > Verify Policy Violation Notifications Destination Overrides: Slack deploy override STANDARD_OUT 05:33:44 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Policy Violation Notifications Destination Overrides: Slack deploy override 05:33:44 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:33:44 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:33:44 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace policy-violation-generic-notification-deploy-override 05:33:44 | DEBUG | IntegrationsTest | Kubernetes | Waiting for policy-violation-generic-notification-deploy-override to start 05:33:44 | DEBUG | IntegrationsTest | Kubernetes | Status of policy-violation-generic-notification-deploy-override's pods: 05:33:44 | DEBUG | IntegrationsTest | Kubernetes | - policy-violation-generic-notification-deploy-override-75d6m4qrt Container status: [] 05:33:44 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for policy-violation-generic-notification-deploy-override 05:33:47 | DEBUG | IntegrationsTest | Kubernetes | Waiting for policy-violation-generic-notification-deploy-override to start 05:33:47 | DEBUG | IntegrationsTest | Kubernetes | Status of policy-violation-generic-notification-deploy-override's pods: 05:33:47 | DEBUG | IntegrationsTest | Kubernetes | - policy-violation-generic-notification-deploy-override-75d6m4qrt Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:33:45Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:33:47 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for policy-violation-generic-notification-deploy-override 05:33:47 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment policy-violation-generic-notification-deploy-override 05:33:47 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment policy-violation-generic-notification-deploy-override with 1 pods 05:33:47 | INFO | IntegrationsTest | Services | SR found deployment policy-violation-generic-notification-deploy-override within 0s 05:33:47 | DEBUG | IntegrationsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:33:47 | INFO | IntegrationsTest | Services | violation size is: 1 05:33:47 | INFO | IntegrationsTest | Services | Policy Notifier Test Policy triggered after waiting 0 seconds 05:33:47 | DEBUG | IntegrationsTest | Notifier | Nothing to validate 05:33:48 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: policy-violation-generic-notification-deploy-override 05:33:48 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Policy Violation Notifications Destination Overrides: #type > Verify Policy Violation Notifications Destination Overrides: Slack deploy override PASSED IntegrationsTest > Verify Policy Violation Notifications Destination Overrides: #type > Verify Policy Violation Notifications Destination Overrides: Slack namespace override STANDARD_OUT 05:33:48 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Policy Violation Notifications Destination Overrides: Slack namespace override 05:33:48 | DEBUG | IntegrationsTest | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:33:48 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:33:48 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace policy-violation-generic-notification-ns-override 05:33:48 | DEBUG | IntegrationsTest | Kubernetes | Waiting for policy-violation-generic-notification-ns-override to start 05:33:48 | DEBUG | IntegrationsTest | Kubernetes | Status of policy-violation-generic-notification-ns-override's pods: 05:33:48 | DEBUG | IntegrationsTest | Kubernetes | - policy-violation-generic-notification-ns-override-7d568f4f47ls4 Container status: [] 05:33:48 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for policy-violation-generic-notification-ns-override 05:33:51 | DEBUG | IntegrationsTest | Kubernetes | Waiting for policy-violation-generic-notification-ns-override to start 05:33:51 | DEBUG | IntegrationsTest | Kubernetes | Status of policy-violation-generic-notification-ns-override's pods: 05:33:51 | DEBUG | IntegrationsTest | Kubernetes | - policy-violation-generic-notification-ns-override-7d568f4f47ls4 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:33:49Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:33:51 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for policy-violation-generic-notification-ns-override 05:33:51 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment policy-violation-generic-notification-ns-override 05:33:51 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment policy-violation-generic-notification-ns-override with 1 pods 05:33:51 | INFO | IntegrationsTest | Services | SR found deployment policy-violation-generic-notification-ns-override within 0s 05:33:51 | DEBUG | IntegrationsTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:33:51 | INFO | IntegrationsTest | Services | violation size is: 1 05:33:51 | INFO | IntegrationsTest | Services | Policy Notifier Test Policy triggered after waiting 0 seconds 05:33:51 | DEBUG | IntegrationsTest | Notifier | Nothing to validate 05:33:51 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: policy-violation-generic-notification-ns-override 05:33:51 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify Policy Violation Notifications Destination Overrides: #type > Verify Policy Violation Notifications Destination Overrides: Slack namespace override PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Stackrox Scanner integration - default config STANDARD_OUT 05:33:51 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Stackrox Scanner integration - default config 05:33:51 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:51 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 188cba87-9c11-4f7f-a3cc-67e970d25372 05:33:51 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 188cba87-9c11-4f7f-a3cc-67e970d25372 05:33:51 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Stackrox Scanner integration - default config PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Clair Scanner integration - default config STANDARD_OUT 05:33:51 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Clair Scanner integration - default config 05:33:52 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:52 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 0b3fb492-17ae-4046-b5a7-25431aec75da 05:33:52 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 0b3fb492-17ae-4046-b5a7-25431aec75da 05:33:52 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:33:52 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Clair Scanner integration - default config SKIPPED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Quay Registry+Scanner integration - default config STANDARD_OUT 05:33:52 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Quay Registry+Scanner integration - default config 05:33:52 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:52 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 6133e751-015b-4b2f-9663-9a735a7b6196 05:33:52 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 6133e751-015b-4b2f-9663-9a735a7b6196 05:33:52 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Quay Registry+Scanner integration - default config PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify GitHub Container Registry integration - default config STANDARD_OUT 05:33:52 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify GitHub Container Registry integration - default config 05:33:53 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:53 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: d117f0f3-4df0-4d5c-96a9-be5560152598 05:33:53 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: d117f0f3-4df0-4d5c-96a9-be5560152598 05:33:53 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify GitHub Container Registry integration - default config PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Google Artifact Registry integration - default config STANDARD_OUT 05:33:53 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Google Artifact Registry integration - default config 05:33:53 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:53 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: e81d03f6-725d-4ec7-813c-ac5ba64900b5 05:33:53 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: e81d03f6-725d-4ec7-813c-ac5ba64900b5 05:33:53 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Google Artifact Registry integration - default config PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Google Artifact Registry integration - requires workload identity STANDARD_OUT 05:33:53 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Google Artifact Registry integration - requires workload identity 05:33:53 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:53 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: f2ff4e9d-cd97-42b3-ae31-6c1ee2af2b6b 05:33:53 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: f2ff4e9d-cd97-42b3-ae31-6c1ee2af2b6b 05:33:53 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: requires GCP workload identity 05:33:53 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Google Artifact Registry integration - requires workload identity SKIPPED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify GCR Registry+Scanner integration - default config STANDARD_OUT 05:33:53 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify GCR Registry+Scanner integration - default config 05:33:53 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:53 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: d197ddc3-1603-4007-a4b9-c3d9ef59caf0 05:33:54 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: d197ddc3-1603-4007-a4b9-c3d9ef59caf0 05:33:54 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify GCR Registry+Scanner integration - default config PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify GCR Registry+Scanner integration - requires workload identity STANDARD_OUT 05:33:54 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify GCR Registry+Scanner integration - requires workload identity 05:33:54 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:54 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: e40af7e0-da65-45f6-aa24-3ba542d11168 05:33:54 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: e40af7e0-da65-45f6-aa24-3ba542d11168 05:33:54 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: requires GCP workload identity 05:33:54 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify GCR Registry+Scanner integration - requires workload identity SKIPPED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Azure Registry integration - default config with AzureConfig STANDARD_OUT 05:33:54 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Azure Registry integration - default config with AzureConfig 05:33:54 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:54 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: d75cc3f4-9759-4d00-8a83-b1bf5ffec886 05:33:54 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: d75cc3f4-9759-4d00-8a83-b1bf5ffec886 05:33:54 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Azure Registry integration - default config with AzureConfig PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Azure Registry integration - default config with DockerConfig STANDARD_OUT 05:33:54 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Azure Registry integration - default config with DockerConfig 05:33:54 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:54 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: bf57925c-2bea-4d6a-a506-30f7e7ffe89e 05:33:54 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: bf57925c-2bea-4d6a-a506-30f7e7ffe89e 05:33:54 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Azure Registry integration - default config with DockerConfig PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Azure Registry integration - requires AKS managed identity STANDARD_OUT 05:33:54 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify Azure Registry integration - requires AKS managed identity 05:33:54 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:54 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 98abd374-a54f-4c11-aaf3-0e7a53916185 05:33:54 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 98abd374-a54f-4c11-aaf3-0e7a53916185 05:33:54 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: requires Azure workload identity 05:33:54 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify Azure Registry integration - requires AKS managed identity SKIPPED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify ECR Registry integration - default config STANDARD_OUT 05:33:54 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify ECR Registry integration - default config 05:33:55 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:55 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 538b8ee0-c43c-463d-926a-465e8b7808c0 05:33:55 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 538b8ee0-c43c-463d-926a-465e8b7808c0 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify ECR Registry integration - default config PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify ECR Registry integration - without endpoint STANDARD_OUT 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify ECR Registry integration - without endpoint 05:33:55 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:55 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 6099fd93-8e56-4905-bcd5-0a2cb09ed0d3 05:33:55 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 6099fd93-8e56-4905-bcd5-0a2cb09ed0d3 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify ECR Registry integration - without endpoint PASSED IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify ECR Registry integration - requires IAM STANDARD_OUT 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify ECR Registry integration - requires IAM 05:33:55 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration tested: Stackrox Scanner 05:33:55 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration created: Stackrox Scanner: 9de727dd-795a-4a86-9f22-35b514e7fbe7 05:33:55 | DEBUG | IntegrationsTest | ImageIntegrationService | Integration found after creation: Stackrox Scanner: 9de727dd-795a-4a86-9f22-35b514e7fbe7 05:33:55 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: requires AWS container IAM role 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify #imageIntegration.name() integration - #testAspect > Verify ECR Registry integration - requires IAM SKIPPED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Stackrox Scanner integration - invalid endpoint STANDARD_OUT 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Stackrox Scanner integration - invalid endpoint 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Stackrox Scanner integration - invalid endpoint PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Clair Scanner integration - invalid endpoint STANDARD_OUT 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Clair Scanner integration - invalid endpoint 05:33:55 | INFO | IntegrationsTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Clair Scanner integration - invalid endpoint SKIPPED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Azure Registry integration - incorrect user STANDARD_OUT 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Azure Registry integration - incorrect user 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Azure Registry integration - incorrect user PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Azure Registry integration - incorrect password STANDARD_OUT 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Azure Registry integration - incorrect password 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Azure Registry integration - incorrect password PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Azure Registry integration - invalid endpoint STANDARD_OUT 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Azure Registry integration - invalid endpoint 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Azure Registry integration - invalid endpoint PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - invalid endpoint STANDARD_OUT 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - invalid endpoint 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - invalid endpoint PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect registry ID STANDARD_OUT 05:33:55 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - incorrect registry ID 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect registry ID PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect region STANDARD_OUT 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - incorrect region 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect region PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect key STANDARD_OUT 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - incorrect key 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect key PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect secret STANDARD_OUT 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - incorrect secret 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - incorrect secret PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - AssumeRole with endpoint set STANDARD_OUT 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - AssumeRole with endpoint set 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - AssumeRole with endpoint set PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - AssumeRole with incorrect role STANDARD_OUT 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - AssumeRole with incorrect role 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - AssumeRole with incorrect role PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - AssumeRole external ID with incorrect external ID STANDARD_OUT 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper ECR Registry integration - AssumeRole external ID with incorrect external ID 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper ECR Registry integration - AssumeRole external ID with incorrect external ID PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Quay Registry+Scanner integration - invalid endpoint STANDARD_OUT 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Quay Registry+Scanner integration - invalid endpoint 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Quay Registry+Scanner integration - invalid endpoint PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Quay Registry+Scanner integration - invalid endpoint STANDARD_OUT 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Quay Registry+Scanner integration - invalid endpoint 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Quay Registry+Scanner integration - invalid endpoint PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Quay Registry+Scanner integration - incorrect token STANDARD_OUT 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper Quay Registry+Scanner integration - incorrect token 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper Quay Registry+Scanner integration - incorrect token PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper GCR Registry+Scanner integration - invalid endpoint STANDARD_OUT 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper GCR Registry+Scanner integration - invalid endpoint 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper GCR Registry+Scanner integration - invalid endpoint PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper GCR Registry+Scanner integration - account without access STANDARD_OUT 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper GCR Registry+Scanner integration - account without access 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper GCR Registry+Scanner integration - account without access PASSED IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper GCR Registry+Scanner integration - incorrect project STANDARD_OUT 05:33:56 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify improper GCR Registry+Scanner integration - incorrect project 05:33:57 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify improper #imageIntegration.name() integration - #testAspect > Verify improper GCR Registry+Scanner integration - incorrect project PASSED IntegrationsTest > Verify syslog notifier STANDARD_OUT 05:33:57 | INFO | IntegrationsTest | IntegrationsTest | Starting testcase: Verify syslog notifier 05:33:57 | DEBUG | IntegrationsTest | OpenShift | Namespace qa already exists 05:33:57 | DEBUG | IntegrationsTest | Kubernetes | Told the orchestrator to createOrReplace syslog-0e28b487-0900-4280-b76e-b6e669710805 05:33:57 | DEBUG | IntegrationsTest | Kubernetes | Waiting for syslog-0e28b487-0900-4280-b76e-b6e669710805 to start 05:33:57 | DEBUG | IntegrationsTest | Kubernetes | Status of syslog-0e28b487-0900-4280-b76e-b6e669710805's pods: 05:33:57 | DEBUG | IntegrationsTest | Kubernetes | - syslog-0e28b487-0900-4280-b76e-b6e669710805-5648f6c79b-jzqwh Container status: [] 05:33:57 | DEBUG | IntegrationsTest | Kubernetes | 0/1 are in the ready state for syslog-0e28b487-0900-4280-b76e-b6e669710805 05:34:00 | DEBUG | IntegrationsTest | Kubernetes | Waiting for syslog-0e28b487-0900-4280-b76e-b6e669710805 to start 05:34:00 | DEBUG | IntegrationsTest | Kubernetes | Status of syslog-0e28b487-0900-4280-b76e-b6e669710805's pods: 05:34:00 | DEBUG | IntegrationsTest | Kubernetes | - syslog-0e28b487-0900-4280-b76e-b6e669710805-5648f6c79b-jzqwh Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:33:57Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:34:00 | DEBUG | IntegrationsTest | Kubernetes | All 1 replicas found in ready state for syslog-0e28b487-0900-4280-b76e-b6e669710805 05:34:00 | DEBUG | IntegrationsTest | Kubernetes | Took 3 seconds for k8s deployment syslog-0e28b487-0900-4280-b76e-b6e669710805 05:34:00 | DEBUG | IntegrationsTest | Kubernetes | Updating deployment syslog-0e28b487-0900-4280-b76e-b6e669710805 with 1 pods 05:34:00 | DEBUG | IntegrationsTest | Kubernetes | rsyslog-service: Service created 05:34:00 | DEBUG | IntegrationsTest | Kubernetes | rest-service: Service created 05:34:15 | DEBUG | IntegrationsTest | Kubernetes | rsyslog-service: Service deleting... 05:34:15 | DEBUG | IntegrationsTest | Kubernetes | rsyslog-service: Service deleted 05:34:15 | DEBUG | IntegrationsTest | Kubernetes | rest-service: Service deleting... 05:34:15 | DEBUG | IntegrationsTest | Kubernetes | rest-service: Service deleted 05:34:15 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: syslog-0e28b487-0900-4280-b76e-b6e669710805 05:34:15 | INFO | IntegrationsTest | IntegrationsTest | Ending testcase IntegrationsTest > Verify syslog notifier PASSED IntegrationsTest STANDARD_OUT 05:34:15 | DEBUG | IntegrationsTest | Kubernetes | Removed the deployment: netpol-notification-test-deployment 05:34:15 | INFO | IntegrationsTest | IntegrationsTest | Ending testsuite 05:34:15 | INFO | IntegrationsTest | IntegrationsTest | Checking if cluster is healthy after test 05:34:15 | DEBUG | IntegrationsTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries K8sEventDetectionTest STANDARD_OUT 05:34:15 | INFO | K8sEventDetectionTest | K8sEventDetectionTest | Starting testsuite 05:34:15 | INFO | K8sEventDetectionTest | K8sEventDetectionTest | Ending testsuite 05:34:15 | INFO | K8sEventDetectionTest | K8sEventDetectionTest | Checking if cluster is healthy after test 05:34:15 | DEBUG | K8sEventDetectionTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries K8sRbacTest STANDARD_OUT 05:34:15 | INFO | K8sRbacTest | K8sRbacTest | Starting testsuite K8sRbacTest > Verify scraped service accounts STANDARD_OUT 05:34:15 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Verify scraped service accounts 05:35:47 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Verify scraped service accounts PASSED K8sRbacTest > Add Service Account and verify it gets scraped STANDARD_OUT 05:35:47 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Add Service Account and verify it gets scraped 05:35:47 | DEBUG | K8sRbacTest | ServiceAccountService | Waiting for Service Account 05:35:47 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Add Service Account and verify it gets scraped PASSED K8sRbacTest > Create deployment with service account and verify relationships STANDARD_OUT 05:35:47 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Create deployment with service account and verify relationships 05:35:47 | DEBUG | K8sRbacTest | OpenShift | Namespace qa already exists 05:35:48 | DEBUG | K8sRbacTest | Kubernetes | Told the orchestrator to createOrReplace test-deployment 05:35:48 | DEBUG | K8sRbacTest | Kubernetes | Waiting for test-deployment to start 05:35:48 | DEBUG | K8sRbacTest | Kubernetes | Status of test-deployment's pods: 05:35:48 | DEBUG | K8sRbacTest | Kubernetes | - test-deployment-59dcbd9977-dmlq6 Container status: [] 05:35:53 | DEBUG | K8sRbacTest | Kubernetes | test-deployment: deployment created (skipped replica wait). 05:35:53 | DEBUG | K8sRbacTest | Kubernetes | Updating deployment test-deployment with 1 pods 05:35:53 | INFO | K8sRbacTest | Services | deploymentID for [test-deployment] is null, checking orchestrator directly for deployment ID 05:35:53 | INFO | K8sRbacTest | Services | SR found deployment test-deployment within 0s 05:35:53 | DEBUG | K8sRbacTest | RbacService | Waiting for Role 05:35:53 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding 05:35:53 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:35:53 | DEBUG | K8sRbacTest | Kubernetes | Removed the deployment: test-deployment 05:35:53 | DEBUG | K8sRbacTest | Kubernetes | test-deployment: deployment removed. 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Create deployment with service account and verify relationships PASSED K8sRbacTest > Remove Service Account and verify it is removed STANDARD_OUT 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Remove Service Account and verify it is removed 05:35:53 | DEBUG | K8sRbacTest | ServiceAccountService | Waiting for Service Account removed 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Remove Service Account and verify it is removed PASSED K8sRbacTest > Verify scraped roles STANDARD_OUT 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Verify scraped roles 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-controller-manager (kube-system) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system::leader-locking-kube-controller-manager (kube-system) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aws-ebs-csi-driver-lease-leader-election (openshift-cluster-csi-drivers) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: csi-snapshot-controller-leaderelection (openshift-cluster-storage-operator) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-approver (openshift-cluster-machine-approver) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-credential-operator-role (openshift-config) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: ingress-operator (openshift-config) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-console-operator) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-cloud-controller-manager (openshift-config-managed) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aws-ebs-csi-driver-operator-aws-config-role (openshift-config-managed) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-dns-operator) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-ingress) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-credential-operator-role (openshift-config-managed) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-cloud-controller-manager (openshift-config) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-user-settings-admin (openshift-console-user-settings) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s-cluster-autoscaler-operator (openshift-machine-api) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-network-diagnostics) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: packageserver-service-cert (openshift-operator-lifecycle-manager) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-operator-etc-pki-entitlement (openshift-config-managed) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: network-node-identity () 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securitypolicies.config.stackrox.io-v1alpha1-admin () 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-control-plane-limited () 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:basic-user () 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-manager-role (openshift-config) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: control-plane-machine-set-operator (openshift-machine-api) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-operator (openshift-machine-api) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-alertmanager-view (openshift-monitoring) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-monitoring) 05:35:53 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: whereabouts-cni (openshift-multus) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: packageserver (openshift-operator-lifecycle-manager) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:sa-creating-openshift-controller-manager (openshift-infra) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: host-networking-services (openshift-kni-infra) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: central-prometheus-k8s (stackrox) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: centrals.platform.stackrox.io-v1alpha1-edit () 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-status () 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-operator (openshift-config) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-operator (openshift-console) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: use-central-scc (stackrox) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:horizontal-pod-autoscaler () 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-kube-scheduler) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-leader-election-role (openshift-operator-controller) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:bootstrap-signer (kube-public) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aws-creds-secret-reader (kube-system) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: extension-apiserver-authentication-reader (kube-system) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-apiserver) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system::leader-locking-kube-scheduler (kube-system) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:bootstrap-signer (kube-system) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (default) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: pod-identity-webhook (openshift-cloud-credential-operator) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-network-config-controller (openshift-cloud-network-config-controller) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:cloud-provider (kube-system) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:token-cleaner (kube-system) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-cluster-version) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-cluster-samples-operator) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: csi-snapshot-controller-operator-role (openshift-cluster-storage-operator) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-controllers (openshift-config) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-insights) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:sa-listing-configmaps (openshift-kube-scheduler) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s-machine-api-operator (openshift-machine-api) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-monitoring-metrics-api (openshift-monitoring) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: central-sts-config-reader (stackrox) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aggregate-olm-edit () 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-cluster-node-tuning-operator) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-leader-election-role (openshift-catalogd) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-controller-manager-operator) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-operator (openshift-config-managed) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-cloud-credential-operator) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-network-public-role (openshift-config-managed) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:oauth-servercert-trust (openshift-config-managed) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: dns-operator (openshift-dns-operator) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-etcd-operator) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: coreos-pull-secret-reader (openshift-config) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-operator-obfuscation-secret (openshift-insights) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-configmap-reader (openshift-config-managed) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-controllers (openshift-config-managed) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-public (openshift-config-managed) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-operator (openshift-insights) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:leader-locking-openshift-controller-manager (openshift-controller-manager) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-config-operator) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: collect-profiles (openshift-operator-lifecycle-manager) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-kube-controller-manager-operator) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: copied-csv-viewer (openshift) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-marketplace-metrics (openshift-marketplace) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-controller-manager) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-manager-role (openshift-catalogd) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-cloud-controller-manager (openshift-cloud-controller-manager-operator) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-controller-manager (openshift-cloud-controller-manager) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-image-registry) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-kube-apiserver-operator) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: host-networking-services (openshift-nutanix-infra) 05:35:54 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: mcc-prometheus-k8s (openshift-machine-config-operator) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: edit (stackrox) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: rhacs-operator.v4.10.0-442-g3e9694559e (stackrox-operator) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: ingress-operator (openshift-ingress-operator) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-metrics-monitor-role (openshift-catalogd) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-operator (openshift-monitoring) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-config-daemon (openshift-machine-config-operator) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: watch-config (stackrox) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-multus) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: shared-resource-viewer (openshift) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-provisioner-volumesnapshot-reader-role () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-proxy-role () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openstack-cloud-controller-manager () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:certificates.k8s.io:certificatesigningrequests:selfnodeclient () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-manager-role (openshift-config) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-kube-apiserver) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-operator (openshift-config) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-ovn-kubernetes) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-alertmanager-api-writer (openshift-user-workload-monitoring) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-rules-edit () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-manager-role () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: rhacs-operator.v4.10.0-4-4jW09JkyWXmM5rZaIEAzmZaGGl7XBi0nouWdDQ () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:legacy-service-account-token-cleaner () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:service-ca-cert-publisher () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:image-auditor () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:monitoring () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-cloud-controller-manager (kube-system) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-cluster-machine-approver) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aws-ebs-csi-driver-operator-role (openshift-cluster-csi-drivers) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: host-networking-services (openshift-openstack-infra) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: network-node-identity-leases (openshift-network-node-identity) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-manager-role () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aws-ebs-csi-driver-operator-clusterrole () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-monitoring-view () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-node-manager () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: csi-snapshot-controller-operator-clusterrole () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:sa-creating-route-controller-manager (openshift-infra) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-metrics-monitor-role (openshift-operator-controller) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: use-privileged-scc (stackrox) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-machine-config-operator) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: centrals.platform.stackrox.io-v1alpha1-crdview () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.global-operators.admin-3gjDVezhGPF6RBtOOpjEpDpKqO39v3NK8r4hmc () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:certificates.k8s.io:kubelet-serving-approver () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:create-events () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:deployer () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: network-diagnostics (openshift-network-diagnostics) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: host-networking-services (openshift-vsphere-infra) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: privileged-scc-use (prefetch-images) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: use-central-db-scc (stackrox) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-proxy-role () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-autoscaler-operator:cluster-reader () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: secured-cluster-prometheus-k8s (stackrox) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-image-registry-operator () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: multus-ancillary-tools () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: router-monitoring () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (kube-system) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-authentication) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aws-ebs-csi-driver-prometheus (openshift-cluster-csi-drivers) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-credential-operator-role () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-samples-operator () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-kube-controller-manager) 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.openshift-cluster-monitoring.view-9QCGFNcofBHQ2DeWEf2qFa4NWqTOGskUedO4Tz () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-iptables-alerter () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s () 05:35:55 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-monitoring-operator-alert-customization (openshift-monitoring) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-control-plane-limited (openshift-ovn-kubernetes) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-route-controller-manager) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-debugger () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: loki-promtail-oauth () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-config-controller () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: use-scanner-scc (stackrox) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: multus-admission-controller-webhook () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.all-namespaces-operator-group.edit-1XZ7hjnJuDBg4AghiumYPXid5VzTcTonVHMeBJ () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: basic-user () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-kube-rbac-proxy () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-clusterextension-viewer-role () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-autoscaler-operator (openshift-machine-api) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: catalogd-metrics-reader () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-network-config-controller () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-node-tuning-operator () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: alertmanager-main () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-admin () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-controllers-metal3-remediation-aggregation () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-operator () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-main-attacher-role () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-console) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-etcd) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-samples-operator (openshift-cluster-samples-operator) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-controllers-metal3-remediation () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: marketplace-operator () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.all-namespaces-operator-group.admin-9gE7IN5P50qJYufUKuJLTNPMsUxktd1gmKyfHl () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.olm-operators.edit-bVVJnBj37eRvbI1svBxms0t0mdsKB26cTBQYrx () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-resizer-storageclass-reader-role () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: packagemanifests-v1-admin () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:node-controller () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-operator (openshift-console-operator) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: rhacs-operator.v4.10.0-4-cvVUpQVi9bQYrPCxPfMs2AEY12Eo4VgtLHDT0H (stackrox-operator) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-config-daemon-events () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-kube-scheduler-operator) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-provisioner-configmap-and-secret-reader-role () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-config-controller-events () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securitypolicies.config.stackrox.io-v1alpha1-edit () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ingress-router () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:update-namespaces () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-apiserver-operator) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-authentication-operator) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-credential-operator-role (openshift-cloud-credential-operator) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.openshift-cluster-monitoring.admin-2SOrzhaSHllEqB6Becsc9Z2BniBuXZxdBrPmIq () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-provisioner-volumeattributesclass-reader-role () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:network-policies () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-main-snapshotter-role () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: pod-identity-webhook () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:build-strategy-source () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s-cluster-baremetal-operator (openshift-machine-api) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-network-operator) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-monitoring-operator-namespaced () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operatorhub-config-reader () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securedclusters.platform.stackrox.io-v1alpha1-view () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: self-provisioner () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:namespace-controller () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:view-cluster () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securedclusters.platform.stackrox.io-v1alpha1-admin () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-user-workload-monitoring) 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: aggregate-olm-view () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: net-attach-def-project () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.all-namespaces-operator-group.view-Hy693YLeM7VQ6B0sFlnElNFvDiMAUfUubKraf () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ingress-operator () 05:35:56 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.global-operators.view-blsDheftOYMzHYeJbysGRVymD2Yx8MmrS7Yi0E () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securedclusters.platform.stackrox.io-v1alpha1-crdview () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:certificate-controller () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:pv-protection-controller () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-manager-role (openshift-operator-controller) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: user-workload-monitoring-config-edit (openshift-user-workload-monitoring) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: centrals.platform.stackrox.io-v1alpha1-admin () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-controllers () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-controller-metrics-reader () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-snapshot-controller-runner () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: rhacs-operator.v4.10.0-4-cvVUpQVi9bQYrPCxPfMs2AEY12Eo4VgtLHDT0H () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-node-tuning:tuned () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securitypolicies.config.stackrox.io-v1alpha1-crdview () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: promtail-prometheus (openshift-e2e-loki) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: mcd-prometheus-k8s (openshift-machine-config-operator) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-service-ca-operator) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: control-plane-machine-set-operator () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: network-diagnostics () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-resizer-volumeattributesclass-reader-role () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-monitoring-operator () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-oauth-apiserver) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: packagemanifests-v1-view () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-alertmanager-api-reader (openshift-user-workload-monitoring) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:endpointslice-controller () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: self-access-reviewer () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:leader-election-lock-cluster-policy-controller (openshift-kube-controller-manager) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-dns) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s (openshift-ingress-operator) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-baremetal-operator () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-operator:cluster-reader () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: metrics-daemon-role () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-main-resizer-role () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: admin () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-dns () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: packagemanifests-v1-edit () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:certificates.k8s.io:legacy-unknown-approver () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:aggregate-to-admin () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:build-strategy-docker () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-image-registry-operator (openshift-image-registry) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus (openshift-cluster-storage-operator) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-approver (openshift-config-managed) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: multus () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.olm-operators.admin-cJW3ICOZ9Osn3oPCTb13AVfBqppCRcP8pbQVFI () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: node-exporter () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: marketplace-operator (openshift-marketplace) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-autoscaler-operator () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s-config (openshift-monitoring) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-controllers (openshift-machine-api) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-alertmanager-edit (openshift-monitoring) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-node-limited (openshift-ovn-kubernetes) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:leader-locking-openshift-route-controller-manager (openshift-route-controller-manager) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:service-ca (openshift-service-ca) 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: ebs-privileged-role () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-main-provisioner-role () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: project-helm-chartrepository-editor () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securitypolicies.config.stackrox.io-v1alpha1-view () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: registry-viewer () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:job-controller () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:build-strategy-custom () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: alert-routing-edit () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-olm-operator () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-samples-operator-imageconfig-reader () 05:35:57 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-extensions-reader () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: helm-chartrepos-viewer () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-operator-gather () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.openshift-cluster-monitoring.edit-brB9auo7mhdQtycRdrSZm5XlKKbUjCe698FPlD () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:aggregated-metrics-reader () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: centrals.platform.stackrox.io-v1alpha1-view () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cloud-controller-manager () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: 2d37771064b7eff82d479204d0da22c78d0e6f703001cda4886c85f4542e417 (stackrox-operator) 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: edit () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: kube-state-metrics () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-config-daemon () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: rhacs-operator-metrics-reader () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-csi-provisioner-volumeattachment-reader-role () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-state-metrics () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: pod-metrics-reader () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:kube-dns () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node-config-reader (openshift-node) 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-lifecycle-manager-metrics (openshift-operator-lifecycle-manager) 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: kube-apiserver () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-os-builder () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-node-limited () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-operator () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: prometheus-k8s-scheduler-resources () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:attachdetach-controller () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:certificates.k8s.io:kube-apiserver-client-approver () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-baremetal-operator (openshift-machine-api) 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-samples-operator-proxy-reader () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-os-builder-events () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.olm-operators.view-8emcFsHayyHMQwkcnb9OTLvkbp0RUOKtlNrGsV () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-udn-viewer () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:aggregate-to-edit () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:edit-compliance () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:deployment-controller () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: node-ca (openshift-image-registry) 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-autoscaler (openshift-machine-api) 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: ebs-kube-rbac-proxy-role () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-rules-view () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-api-operator-ext-remediation () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:auth-delegator () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-reader () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:cluster-csr-approver-controller () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:daemon-set-controller () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:origin-namespace-controller () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:openshift-route-controller-manager () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: config-controller-manager-role (stackrox) 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:image-import-controller () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-to-cluster-reader () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:certificates.k8s.io:certificatesigningrequests:nodeclient () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:ephemeral-volume-controller () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:namespace-security-allocation-controller () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:serviceaccount-controller () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:service-cidrs-controller () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:image-pruner () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:kube-scheduler () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:kubelet-api-admin () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:serviceaccount-pull-secrets-controller () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:gateway-api:aggregate-to-admin () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:build-controller () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:deployer-controller () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:check-endpoints-node-reader () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:router () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:review-tokens () 05:35:58 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:pvc-protection-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:ttl-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:route-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-cluster-reader () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: operator-lifecycle-manager-metrics-reader () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: securedclusters.platform.stackrox.io-v1alpha1-edit () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:clusterrole-aggregation-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:volumeattributesclass-protection-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:public-info-viewer () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:sdn-reader () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:resourcequota-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:root-ca-cert-publisher () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: machine-config-server () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: monitoring-edit () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-snapshots-to-view () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:replication-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:build-config-change-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:service-ingress-ip-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:restricted-v2 () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:scope-impersonation () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: whereabouts-cni () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:image-builder () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:check-endpoints () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:horizontal-pod-autoscaler () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:resourcequota-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:nonroot () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node-problem-detector () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:service-account-issuer-discovery () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:cloud-credential-operator:cluster-reader () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:machine-config-operator:cluster-reader () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:openshift-controller-manager:image-trigger-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:openshift-controller-manager:update-buildconfig-status () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:pod-garbage-collector () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox-central-diagnostics (stackrox) 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: cluster-autoscaler () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: console-operator () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: dns-monitoring () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: loki-promtail () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-ovn-kubernetes-udn-editor () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-operator () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: insights-runtime-extractor-role () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:unidling-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:disruption-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node-admin () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node-proxier () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:image-trigger-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:restricted-v3 () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:gateway-api:aggregate-to-view () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: storage-admin () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-to-basic-user () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: olm.og.global-operators.edit-aFTmGKi9ZRUPJ2Dsphpd4NvovRSYjV3grbNdzM () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:heapster () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:image-pusher () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-snapshots-to-basic-user () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:deploymentconfig-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: registry-admin () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: sudoer () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:generic-garbage-collector () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:image-signer () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:cluster-samples-operator:cluster-reader () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:openshift-controller-manager () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:openshift-controller-manager:ingress-to-route-controller () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:templateservicebroker-client () 05:35:59 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:cluster-quota-reconciliation-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: registry-editor () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: registry-monitoring () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:webhook () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:service-account-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:expand-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-to-storage-admin () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:hostaccess () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:useroauthaccesstoken-manager () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:restricted () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:registry () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:cronjob-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:endpointslicemirroring-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: stackrox:edit-workloads () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:aggregate-to-view () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:build-strategy-jenkinspipeline () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:operator:etcd-backup-role () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:nested-container () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: thanos-querier () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:operator:cloud-controller-manager () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:tokenreview-openshift-route-controller-manager () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-snapshots-to-storage-admin () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-to-view () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:volume-scheduler () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:nonroot-v2 () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:hostnetwork-v2 () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:tokenreview-openshift-controller-manager () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node-reader () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:operator-lifecycle-manager () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:pv-recycler-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:service-ca () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:template-instance-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:hostmount () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:privileged () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: volume-data-source-validator () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:template-instance-finalizer-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:discovery () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:hostmount-anyuid () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:validatingadmissionpolicy-status-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:ttl-after-finished-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:check-endpoints-crd-reader () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:statefulset-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:master () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:cluster-config-operator:cluster-reader () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:discovery () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: openshift-dns-operator () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-to-admin () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:hostnetwork () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:sdn-manager () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:template-service-broker () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:replicaset-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:selinux-warning-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:default-rolebindings-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: test-role (qa) 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:image-puller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:persistent-volume-binder () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:service-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:kube-aggregator () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:kube-controller-manager () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:metrics-server () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: view () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:podsecurity-admission-label-syncer-controller () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:public-info-viewer () 05:36:00 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:node-bootstrapper () 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:persistent-volume-provisioner () 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:controller:endpoint-controller () 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:certificates.k8s.io:kube-apiserver-client-kubelet-approver () 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-snapshots-to-admin () 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:privileged-namespaces-psa-label-syncer () 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:oauth-token-deleter () 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:aggregate-to-edit () 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:anyuid () 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:scc:hostmount-anyuid-v2 () 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Looking for SR Role: system:openshift:controller:machine-approver () 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Verify scraped roles PASSED K8sRbacTest > Add Role and verify it gets scraped STANDARD_OUT 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Add Role and verify it gets scraped 05:36:01 | DEBUG | K8sRbacTest | RbacService | Waiting for Role 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Add Role and verify it gets scraped PASSED K8sRbacTest > Remove Role and verify it is removed STANDARD_OUT 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Remove Role and verify it is removed 05:36:01 | DEBUG | K8sRbacTest | RbacService | Waiting for Role removed 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Remove Role and verify it is removed PASSED K8sRbacTest > Add Cluster Role and verify it gets scraped STANDARD_OUT 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Add Cluster Role and verify it gets scraped 05:36:01 | DEBUG | K8sRbacTest | RbacService | Waiting for Role 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Add Cluster Role and verify it gets scraped PASSED K8sRbacTest > Remove Cluster Role and verify it is removed STANDARD_OUT 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Remove Cluster Role and verify it is removed 05:36:01 | DEBUG | K8sRbacTest | RbacService | Waiting for Role removed 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Remove Cluster Role and verify it is removed PASSED K8sRbacTest > Verify scraped bindings STANDARD_OUT 05:36:01 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Verify scraped bindings 05:36:01 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:36:11 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Verify scraped bindings PASSED K8sRbacTest > Verify returned subject list is complete STANDARD_OUT 05:36:11 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Verify returned subject list is complete 05:36:20 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Verify returned subject list is complete PASSED K8sRbacTest > Add Binding with role ref and verify it gets scraped STANDARD_OUT 05:36:20 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Add Binding with role ref and verify it gets scraped 05:36:20 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding 05:36:20 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:36:20 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Add Binding with role ref and verify it gets scraped PASSED K8sRbacTest > Remove Binding with role ref and verify it is removed STANDARD_OUT 05:36:20 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Remove Binding with role ref and verify it is removed 05:36:20 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding removed 05:36:20 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:36:20 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Remove Binding with role ref and verify it is removed PASSED K8sRbacTest > Add Binding with cluster role ref and verify it gets scraped STANDARD_OUT 05:36:20 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Add Binding with cluster role ref and verify it gets scraped 05:36:20 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding 05:36:20 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:36:20 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Add Binding with cluster role ref and verify it gets scraped PASSED K8sRbacTest > Remove Binding with cluster role ref and verify it is removed STANDARD_OUT 05:36:20 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Remove Binding with cluster role ref and verify it is removed 05:36:20 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding removed 05:36:20 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:36:21 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Remove Binding with cluster role ref and verify it is removed PASSED K8sRbacTest > Add cluster Binding and verify it gets scraped STANDARD_OUT 05:36:21 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Add cluster Binding and verify it gets scraped 05:36:21 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding 05:36:21 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:36:21 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Add cluster Binding and verify it gets scraped PASSED K8sRbacTest > Remove cluster Binding and verify it is removed STANDARD_OUT 05:36:21 | INFO | K8sRbacTest | K8sRbacTest | Starting testcase: Remove cluster Binding and verify it is removed 05:36:21 | DEBUG | K8sRbacTest | RbacService | Waiting for Role Binding removed 05:36:21 | DEBUG | K8sRbacTest | RbacService | Get bindings list: 05:36:21 | INFO | K8sRbacTest | K8sRbacTest | Ending testcase K8sRbacTest > Remove cluster Binding and verify it is removed PASSED K8sRbacTest STANDARD_OUT 05:36:21 | INFO | K8sRbacTest | K8sRbacTest | Ending testsuite 05:36:21 | INFO | K8sRbacTest | K8sRbacTest | Checking if cluster is healthy after test 05:36:21 | DEBUG | K8sRbacTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries LocalQaPropsTest > CheckPropertyFileInputValue > GOOGLE_CREDENTIALS_GCR_SCANNER_V2 SKIPPED LocalQaPropsTest > CheckPropertyFileInputValue > GOOGLE_CREDENTIALS_GCR_NO_ACCESS_KEY_V2 SKIPPED NamespaceTest STANDARD_OUT 05:36:21 | INFO | NamespaceTest | NamespaceTest | Starting testsuite NamespaceTest > Verify namespace details STANDARD_OUT 05:36:21 | INFO | NamespaceTest | NamespaceTest | Starting testcase: Verify namespace details 05:36:21 | INFO | NamespaceTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:36:21 | INFO | NamespaceTest | NamespaceTest | Ending testcase NamespaceTest > Verify namespace details SKIPPED NamespaceTest STANDARD_OUT 05:36:21 | INFO | NamespaceTest | NamespaceTest | Ending testsuite 05:36:21 | INFO | NamespaceTest | NamespaceTest | Checking if cluster is healthy after test 05:36:21 | DEBUG | NamespaceTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries NetworkBaselineTest STANDARD_OUT 05:36:21 | INFO | NetworkBaselineTest | NetworkBaselineTest | Starting testsuite NetworkBaselineTest > Verify network baseline functionality STANDARD_OUT 05:36:21 | INFO | NetworkBaselineTest | NetworkBaselineTest | Starting testcase: Verify network baseline functionality 05:36:21 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:36:21 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-server service created 05:36:21 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-server 05:36:21 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:36:21 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-client-baselined 05:36:21 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-server to start 05:36:21 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-server's pods: 05:36:21 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-server-6946f95f79-gppp8 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:36:21 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for net-bl-server 05:36:24 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-server to start 05:36:24 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-server's pods: 05:36:24 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-server-6946f95f79-gppp8 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:36:22Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:36:24 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-server 05:36:24 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment net-bl-server 05:36:24 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-server with 1 pods 05:36:24 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-baselined to start 05:36:24 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-baselined's pods: 05:36:24 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-client-baselined-5787b59ff4-zphm5 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:36:22Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:36:24 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-client-baselined 05:36:24 | DEBUG | NetworkBaselineTest | Kubernetes | Took 0 seconds for k8s deployment net-bl-client-baselined 05:36:24 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-client-baselined with 1 pods 05:36:24 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-server within 0s 05:36:24 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-client-baselined within 0s 05:36:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:36:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:36:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Source Id aa422d7e-ba0e-426b-b4c1-1998c0b37bb7 -> edge target key: 3 05:37:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> targetId: 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764221791.409079000 05:37:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Found source aa422d7e-ba0e-426b-b4c1-1998c0b37bb7 -> target 998ac6b0-6cf7-4233-9bae-c79da721e8a4 in graph after 45.413s 05:37:10 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:37:10 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-client-anomalous 05:37:10 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-anomalous to start 05:37:10 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-anomalous's pods: 05:37:10 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-client-anomalous-84996b6c9c-tjdqd Container status: [] 05:37:10 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for net-bl-client-anomalous 05:37:13 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-anomalous to start 05:37:13 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-anomalous's pods: 05:37:13 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-client-anomalous-84996b6c9c-tjdqd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:37:10Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:37:13 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-client-anomalous 05:37:13 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment net-bl-client-anomalous 05:37:13 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-client-anomalous with 1 pods 05:37:13 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-client-anomalous within 0s 05:37:13 | INFO | NetworkBaselineTest | NetworkBaselineTest | Deployment IDs Server: 998ac6b0-6cf7-4233-9bae-c79da721e8a4, Baselined client: aa422d7e-ba0e-426b-b4c1-1998c0b37bb7, Anomalous client: b1b50549-beec-499b-955a-d1fdc064fd70 05:37:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:37:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:37:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:38:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:38:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:39:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:39:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:40:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:40:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:41 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:42 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:43 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:44 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:45 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:46 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:41:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:41:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:42:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:42:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:42:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:42:04 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:42:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:42:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:42:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:42:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:42:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b1b50549-beec-499b-955a-d1fdc064fd70, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:42:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:42:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Source Id b1b50549-beec-499b-955a-d1fdc064fd70 -> edge target key: 1 05:42:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> targetId: 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:42:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222130.273473590 05:42:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Found source b1b50549-beec-499b-955a-d1fdc064fd70 -> target 998ac6b0-6cf7-4233-9bae-c79da721e8a4 in graph after 296.935s 05:42:10 | INFO | NetworkBaselineTest | NetworkBaselineTest | Anomalous Baseline: deployment_id: "b1b50549-beec-499b-955a-d1fdc064fd70" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764221950 nanos: 250663000 } deployment_name: "net-bl-client-anomalous" 05:42:10 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:42:10 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-client-deferred-baselined 05:42:10 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-deferred-baselined to start 05:42:10 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-deferred-baselined's pods: 05:42:10 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for net-bl-client-deferred-baselined 05:42:13 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-deferred-baselined to start 05:42:13 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-deferred-baselined's pods: 05:42:13 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-client-deferred-baselined-6d87cc64d-mnr7c Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:42:11Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:42:13 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-client-deferred-baselined 05:42:13 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment net-bl-client-deferred-baselined 05:42:13 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-client-deferred-baselined with 1 pods 05:42:13 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-client-deferred-baselined within 0s 05:42:13 | INFO | NetworkBaselineTest | NetworkBaselineTest | Deferred Baseline: 32e878cd-aa32-46bb-b14c-51572498eef7 05:42:13 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 0 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:42:17 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 1 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:42:21 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 2 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:42:25 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 3 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:42:29 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 4 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:42:33 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 5 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:42:37 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 6 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:42:41 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 7 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:42:45 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 8 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:42:49 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 9 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:42:53 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 10 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:42:57 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 11 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:01 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 12 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:05 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 13 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:09 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 14 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:13 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 15 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:17 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 16 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:21 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 17 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:25 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 18 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:29 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 19 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:33 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 20 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:37 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 21 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:41 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 22 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:45 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 23 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:49 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 24 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:53 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 25 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:43:58 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 26 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:44:02 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 27 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:44:06 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 28 of 30): java.lang.RuntimeException: Baseline 32e878cd-aa32-46bb-b14c-51572498eef7 is in observation. Baseline is deployment_id: "32e878cd-aa32-46bb-b14c-51572498eef7" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "998ac6b0-6cf7-4233-9bae-c79da721e8a4" deployment { name: "net-bl-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222250 nanos: 436971000 } deployment_name: "net-bl-client-deferred-baselined" 05:44:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 32e878cd-aa32-46bb-b14c-51572498eef7, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:44:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:44:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Source Id 32e878cd-aa32-46bb-b14c-51572498eef7 -> edge target key: 4 05:44:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> targetId: 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:44:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222250.101279334 05:44:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Found source 32e878cd-aa32-46bb-b14c-51572498eef7 -> target 998ac6b0-6cf7-4233-9bae-c79da721e8a4 in graph after 0.053s 05:44:10 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:44:10 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-client-post-lock 05:44:10 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-post-lock to start 05:44:10 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-post-lock's pods: 05:44:10 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for net-bl-client-post-lock 05:44:13 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-client-post-lock to start 05:44:13 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-client-post-lock's pods: 05:44:13 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-client-post-lock-c8f868d79-lw7lk Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:44:11Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:44:13 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-client-post-lock 05:44:13 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment net-bl-client-post-lock 05:44:13 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-client-post-lock with 1 pods 05:44:13 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-client-post-lock within 0s 05:44:13 | INFO | NetworkBaselineTest | NetworkBaselineTest | Post Lock Deployment: 5d242211-85aa-4e3d-aff0-0aad01800744 05:44:13 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 0 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:44:17 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 1 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:44:21 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 2 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:44:25 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 3 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:44:29 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 4 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:44:33 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 5 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:44:37 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 6 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:44:41 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 7 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:44:45 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 8 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:44:49 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 9 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:44:53 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 10 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:44:57 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 11 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:01 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 12 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:05 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 13 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:09 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 14 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:13 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 15 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:17 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 16 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:21 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 17 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:25 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 18 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:29 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 19 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:33 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 20 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:37 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 21 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:41 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 22 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:45 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 23 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:49 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 24 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:53 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 25 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:45:57 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 26 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:46:01 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 27 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:46:05 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 28 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:46:09 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 4s (attempt 29 of 30): java.lang.RuntimeException: Baseline 5d242211-85aa-4e3d-aff0-0aad01800744 is not out of observation yet. Baseline is deployment_id: "5d242211-85aa-4e3d-aff0-0aad01800744" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" observation_period_end { seconds: 1764222370 nanos: 287388000 } deployment_name: "net-bl-client-post-lock" 05:46:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 5d242211-85aa-4e3d-aff0-0aad01800744, targetId 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:46:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Source Id 5d242211-85aa-4e3d-aff0-0aad01800744 -> edge target key: 4 05:46:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> targetId: 998ac6b0-6cf7-4233-9bae-c79da721e8a4 05:46:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222373.979540504 05:46:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Found source 5d242211-85aa-4e3d-aff0-0aad01800744 -> target 998ac6b0-6cf7-4233-9bae-c79da721e8a4 in graph after 0.051s 05:46:14 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:46:14 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-user-server service created 05:46:14 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-user-server 05:46:14 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-user-server to start 05:46:14 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-user-server's pods: 05:46:14 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-user-server-647f7f887f-vvdk9 Container status: [] 05:46:14 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for net-bl-user-server 05:46:17 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-user-server to start 05:46:17 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-user-server's pods: 05:46:17 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-user-server-647f7f887f-vvdk9 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:46:14Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:46:17 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-user-server 05:46:17 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment net-bl-user-server 05:46:17 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-user-server with 1 pods 05:46:17 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-user-server within 0s 05:46:17 | INFO | NetworkBaselineTest | NetworkBaselineTest | Deployment IDs Server: 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:17 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:46:17 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace net-bl-user-client-baselined 05:46:17 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-user-client-baselined to start 05:46:17 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-user-client-baselined's pods: 05:46:17 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-user-client-baselined-79f5ff6d9b-f6gt8 Container status: [] 05:46:17 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for net-bl-user-client-baselined 05:46:20 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for net-bl-user-client-baselined to start 05:46:20 | DEBUG | NetworkBaselineTest | Kubernetes | Status of net-bl-user-client-baselined's pods: 05:46:20 | DEBUG | NetworkBaselineTest | Kubernetes | - net-bl-user-client-baselined-79f5ff6d9b-f6gt8 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:46:18Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:46:20 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for net-bl-user-client-baselined 05:46:20 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment net-bl-user-client-baselined 05:46:20 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment net-bl-user-client-baselined with 1 pods 05:46:20 | INFO | NetworkBaselineTest | Services | SR found deployment net-bl-user-client-baselined within 0s 05:46:20 | INFO | NetworkBaselineTest | NetworkBaselineTest | Client deployment: 202a3976-ef6a-4189-abf7-0ef07994fc9e 05:46:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:24 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 202a3976-ef6a-4189-abf7-0ef07994fc9e, targetId 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:46:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Source Id 202a3976-ef6a-4189-abf7-0ef07994fc9e -> edge target key: 6 05:46:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> targetId: 2957cd4e-8c0d-4b93-b293-34c09b536cff 05:46:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222400.438218970 05:46:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Found source 202a3976-ef6a-4189-abf7-0ef07994fc9e -> target 2957cd4e-8c0d-4b93-b293-34c09b536cff in graph after 20.002s 05:46:40 | INFO | NetworkBaselineTest | NetworkBaselineTest | Server Baseline: deployment_id: "2957cd4e-8c0d-4b93-b293-34c09b536cff" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "202a3976-ef6a-4189-abf7-0ef07994fc9e" deployment { name: "net-bl-user-client-baselined" } } } properties { ingress: true port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222494 nanos: 129715000 } deployment_name: "net-bl-user-server" 05:46:40 | INFO | NetworkBaselineTest | NetworkBaselineTest | Client Baseline: deployment_id: "202a3976-ef6a-4189-abf7-0ef07994fc9e" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa" peers { entity { info { type: DEPLOYMENT id: "2957cd4e-8c0d-4b93-b293-34c09b536cff" deployment { name: "net-bl-user-server" } } } properties { port: 80 protocol: L4_PROTOCOL_TCP } } observation_period_end { seconds: 1764222497 nanos: 324315000 } deployment_name: "net-bl-user-client-baselined" 05:46:40 | INFO | NetworkBaselineTest | NetworkBaselineTest | Deleting the deployments. 05:46:40 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-server: Service deleting... 05:46:40 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-server: Service deleted 05:46:40 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-server 05:46:40 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-baselined 05:46:40 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-user-server: Service deleting... 05:46:40 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-user-server: Service deleted 05:46:40 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-user-server 05:46:40 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-user-client-baselined 05:46:40 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-anomalous 05:46:40 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-deferred-baselined 05:46:40 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-post-lock 05:46:40 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: multiple-external-destination-source 05:46:45 | DEBUG | NetworkBaselineTest | Kubernetes | collector-config: ConfigMap removed. 05:46:45 | INFO | NetworkBaselineTest | NetworkBaselineTest | Ending testcase NetworkBaselineTest > Verify network baseline functionality PASSED NetworkBaselineTest > Verify network baseline functionality with multiple external entities STANDARD_OUT 05:46:45 | INFO | NetworkBaselineTest | NetworkBaselineTest | Starting testcase: Verify network baseline functionality with multiple external entities 05:46:45 | DEBUG | NetworkBaselineTest | Kubernetes | collector-config: ConfigMap created. 05:46:45 | INFO | NetworkBaselineTest | CollectorUtil | Waiting for Collector Config propagation (6 pods) 05:46:52 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 0 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@363a0c5f, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@2c0104af, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@154b4616, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@30055646, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@14850895] 05:46:59 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 1 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@363a0c5f, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@2c0104af, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@14850895] 05:47:05 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 2 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@363a0c5f, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@2c0104af, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@14850895] 05:47:10 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 3 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@363a0c5f, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@2c0104af, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@14850895] 05:47:15 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 4 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@363a0c5f, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@2c0104af, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a, io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@14850895] 05:47:20 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 5 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a] 05:47:23 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 6 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a] 05:47:25 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 7 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a] 05:47:27 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 8 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a] 05:47:29 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 9 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a] 05:47:31 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 10 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a] 05:47:33 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 11 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a] 05:47:35 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 12 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a] 05:47:37 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 13 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a] 05:47:39 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 14 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a] 05:47:41 | DEBUG | NetworkBaselineTest | Helpers | Caught exception. Retrying in 1s (attempt 15 of 90): Assertion failed: assert portForwards.isEmpty() | | | false [io.fabric8.kubernetes.client.dsl.internal.PortForwarderWebsocket$1@563bf02a] 05:47:43 | INFO | NetworkBaselineTest | CollectorUtil | Waited for 17 seconds for Collector runtime configuration to be updated 05:47:43 | DEBUG | NetworkBaselineTest | OpenShift | Namespace qa already exists 05:47:43 | DEBUG | NetworkBaselineTest | Kubernetes | Told the orchestrator to createOrReplace multiple-external-destination-source 05:47:43 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for multiple-external-destination-source to start 05:47:43 | DEBUG | NetworkBaselineTest | Kubernetes | Status of multiple-external-destination-source's pods: 05:47:43 | DEBUG | NetworkBaselineTest | Kubernetes | - multiple-external-destination-source-6549d759f6-cjnxn Container status: [] 05:47:43 | DEBUG | NetworkBaselineTest | Kubernetes | 0/1 are in the ready state for multiple-external-destination-source 05:47:46 | DEBUG | NetworkBaselineTest | Kubernetes | Waiting for multiple-external-destination-source to start 05:47:46 | DEBUG | NetworkBaselineTest | Kubernetes | Status of multiple-external-destination-source's pods: 05:47:46 | DEBUG | NetworkBaselineTest | Kubernetes | - multiple-external-destination-source-6549d759f6-cjnxn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:47:44Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:47:46 | DEBUG | NetworkBaselineTest | Kubernetes | All 1 replicas found in ready state for multiple-external-destination-source 05:47:46 | DEBUG | NetworkBaselineTest | Kubernetes | Took 3 seconds for k8s deployment multiple-external-destination-source 05:47:46 | DEBUG | NetworkBaselineTest | Kubernetes | Updating deployment multiple-external-destination-source with 1 pods 05:47:47 | INFO | NetworkBaselineTest | Services | SR found deployment multiple-external-destination-source within 0s 05:47:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:47:47 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:47:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:47:48 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:47:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:47:49 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:47:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:47:50 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:47:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:47:51 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:47:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:47:52 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:47:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:47:53 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:47:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:47:54 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:47:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:47:55 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:47:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:47:56 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:47:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:47:57 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:47:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:47:58 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:47:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:47:59 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:00 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:01 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:02 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:03 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:05 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:06 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:07 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:08 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:09 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:10 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:11 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:12 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:13 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:14 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:15 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:16 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:17 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:18 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:19 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:20 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:21 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:22 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:23 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:25 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:26 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:27 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:28 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:29 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:30 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:31 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:32 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:33 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:34 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:35 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:36 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:37 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:38 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:39 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Checking for edge between deployments: sourceId fd556994-4180-4b90-aef3-93a0ebcee262, targetId afa12424-bde3-4313-b810-bb463cbe8f90 05:48:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Source Id fd556994-4180-4b90-aef3-93a0ebcee262 -> edge target key: 145 05:48:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> targetId: afa12424-bde3-4313-b810-bb463cbe8f90 05:48:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 53 L4_PROTOCOL_TCP 1764222520.860803165 05:48:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222520.860986628 05:48:40 | DEBUG | NetworkBaselineTest | NetworkGraphUtil | Found source fd556994-4180-4b90-aef3-93a0ebcee262 -> target afa12424-bde3-4313-b810-bb463cbe8f90 in graph after 53.866s 05:48:41 | INFO | NetworkBaselineTest | NetworkBaselineTest | Deleting the deployments. 05:48:41 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-server: Service deleting... 05:48:41 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-server: Service deleted 05:48:41 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-server 05:48:41 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-baselined 05:48:41 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-user-server: Service deleting... 05:48:41 | DEBUG | NetworkBaselineTest | Kubernetes | net-bl-user-server: Service deleted 05:48:41 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-user-server 05:48:41 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-user-client-baselined 05:48:41 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-anomalous 05:48:41 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-deferred-baselined 05:48:41 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: net-bl-client-post-lock 05:48:41 | DEBUG | NetworkBaselineTest | Kubernetes | Removed the deployment: multiple-external-destination-source 05:48:46 | DEBUG | NetworkBaselineTest | Kubernetes | collector-config: ConfigMap removed. 05:48:46 | INFO | NetworkBaselineTest | NetworkBaselineTest | Ending testcase NetworkBaselineTest > Verify network baseline functionality with multiple external entities PASSED NetworkBaselineTest STANDARD_OUT 05:48:46 | INFO | NetworkBaselineTest | NetworkBaselineTest | Ending testsuite 05:48:46 | INFO | NetworkBaselineTest | NetworkBaselineTest | Checking if cluster is healthy after test 05:48:46 | DEBUG | NetworkBaselineTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries NetworkFlowTest STANDARD_OUT 05:48:46 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testsuite 05:48:46 | DEBUG | NetworkFlowTest | Kubernetes | quay: secret created. 05:48:46 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:48:46 | DEBUG | NetworkFlowTest | Kubernetes | udp-connection-target service created 05:48:46 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace udp-connection-target 05:48:46 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:48:46 | DEBUG | NetworkFlowTest | Kubernetes | tcp-connection-target service created 05:48:46 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-target 05:48:46 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:48:46 | DEBUG | NetworkFlowTest | Kubernetes | nginx-connection-target service created 05:48:46 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for LB external IP for nginx-connection-target 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | LB IP: af60ab0a2158747e4b0d55ad260786cf-497533505.XXXXXXXXX.elb.amazonaws.com 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace nginx-connection-target 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for LB external IP for nginx-connection-target 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | LB IP: af60ab0a2158747e4b0d55ad260786cf-497533505.XXXXXXXXX.elb.amazonaws.com 05:48:50 | DEBUG | NetworkFlowTest | OpenShift | Creating a route: nginx-connection-target 05:48:50 | DEBUG | NetworkFlowTest | OpenShift | Waiting for route: nginx-connection-target 05:48:50 | DEBUG | NetworkFlowTest | OpenShift | Route Host: nginx-connection-target-qa.apps.ci-op-s5qqhm5d-f4e91.cspilp.interop.ccitredhat.com 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for udp-connection-target to start 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | Status of udp-connection-target's pods: 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | - udp-connection-target-8498855dbd-pf99z Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:48:47Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for udp-connection-target 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment udp-connection-target 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment udp-connection-target with 1 pods 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for tcp-connection-target to start 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | Status of tcp-connection-target's pods: 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | - tcp-connection-target-5855c6f486-sks27 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:48:47Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for tcp-connection-target 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-target 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment tcp-connection-target with 1 pods 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for nginx-connection-target to start 05:48:50 | DEBUG | NetworkFlowTest | Kubernetes | Status of nginx-connection-target's pods: 05:48:51 | DEBUG | NetworkFlowTest | Kubernetes | - nginx-connection-target-8678b6d5c5-r6lrr Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:48:51 | DEBUG | NetworkFlowTest | Kubernetes | 0/1 are in the ready state for nginx-connection-target 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for nginx-connection-target to start 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Status of nginx-connection-target's pods: 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | - nginx-connection-target-8678b6d5c5-r6lrr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:48:51Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for nginx-connection-target 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Took 3 seconds for k8s deployment nginx-connection-target 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment nginx-connection-target with 1 pods 05:48:54 | INFO | NetworkFlowTest | Services | SR found deployment udp-connection-target within 0s 05:48:54 | INFO | NetworkFlowTest | Services | SR found deployment tcp-connection-target within 0s 05:48:54 | INFO | NetworkFlowTest | Services | SR found deployment nginx-connection-target within 0s 05:48:54 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace no-connection-source 05:48:54 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace short-consistent-source 05:48:54 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace single-connection-source 05:48:54 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace udp-connection-source 05:48:54 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-source 05:48:54 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace two-ports-connect-source 05:48:54 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa already exists 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace external-destination-source 05:48:54 | DEBUG | NetworkFlowTest | OpenShift | Namespace qa2 already exists 05:48:54 | DEBUG | NetworkFlowTest | OpenShift | Adding system:serviceaccount:qa2:default to anyuid user list 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Told the orchestrator to createOrReplace tcp-connection-source-qa2 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for no-connection-source to start 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | Status of no-connection-source's pods: 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | - no-connection-source-6567766fb-vjz5s Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:48:54 | DEBUG | NetworkFlowTest | Kubernetes | 0/1 are in the ready state for no-connection-source 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for no-connection-source to start 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Status of no-connection-source's pods: 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | - no-connection-source-6567766fb-vjz5s Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:48:54Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for no-connection-source 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Took 3 seconds for k8s deployment no-connection-source 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment no-connection-source with 1 pods 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for short-consistent-source to start 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Status of short-consistent-source's pods: 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | - short-consistent-source-57b5fc5c6b-kpbdg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:48:54Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for short-consistent-source 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment short-consistent-source 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment short-consistent-source with 1 pods 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for single-connection-source to start 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Status of single-connection-source's pods: 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | - single-connection-source-74b67bdc87-wtvp7 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:48:55Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for single-connection-source 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment single-connection-source 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment single-connection-source with 1 pods 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for udp-connection-source to start 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Status of udp-connection-source's pods: 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | - udp-connection-source-6467557d99-hjt8x Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:48:55Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for udp-connection-source 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment udp-connection-source 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment udp-connection-source with 1 pods 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for tcp-connection-source to start 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Status of tcp-connection-source's pods: 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | - tcp-connection-source-86468fcf9f-s9xzr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:48:55Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for tcp-connection-source 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-source 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment tcp-connection-source with 1 pods 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for two-ports-connect-source to start 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Status of two-ports-connect-source's pods: 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | - two-ports-connect-source-6b787bf579-s4hww Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:48:55Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for two-ports-connect-source 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment two-ports-connect-source 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment two-ports-connect-source with 1 pods 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for external-destination-source to start 05:48:57 | DEBUG | NetworkFlowTest | Kubernetes | Status of external-destination-source's pods: 05:48:58 | DEBUG | NetworkFlowTest | Kubernetes | - external-destination-source-7bc6bd9bc7-7d9kt Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:48:55Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:48:58 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for external-destination-source 05:48:58 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment external-destination-source 05:48:58 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment external-destination-source with 1 pods 05:48:58 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for tcp-connection-source-qa2 to start 05:48:58 | DEBUG | NetworkFlowTest | Kubernetes | Status of tcp-connection-source-qa2's pods: 05:48:58 | DEBUG | NetworkFlowTest | Kubernetes | - tcp-connection-source-qa2-64f46545bb-x9hl6 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:48:55Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:48:58 | DEBUG | NetworkFlowTest | Kubernetes | All 1 replicas found in ready state for tcp-connection-source-qa2 05:48:58 | DEBUG | NetworkFlowTest | Kubernetes | Took 0 seconds for k8s deployment tcp-connection-source-qa2 05:48:58 | DEBUG | NetworkFlowTest | Kubernetes | Updating deployment tcp-connection-source-qa2 with 1 pods 05:48:58 | INFO | NetworkFlowTest | Services | SR found deployment no-connection-source within 0s 05:48:58 | INFO | NetworkFlowTest | Services | SR found deployment short-consistent-source within 0s 05:48:58 | INFO | NetworkFlowTest | Services | SR found deployment single-connection-source within 0s 05:48:58 | INFO | NetworkFlowTest | Services | SR found deployment udp-connection-source within 0s 05:48:58 | INFO | NetworkFlowTest | Services | SR found deployment tcp-connection-source within 0s 05:48:58 | INFO | NetworkFlowTest | Services | SR found deployment two-ports-connect-source within 0s 05:48:58 | INFO | NetworkFlowTest | Services | SR found deployment external-destination-source within 0s 05:48:58 | INFO | NetworkFlowTest | Services | SR found deployment tcp-connection-source-qa2 within 0s NetworkFlowTest > Verify one-time connections show at first and are closed after the afterglow period STANDARD_OUT 05:48:58 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify one-time connections show at first and are closed after the afterglow period 05:48:58 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between single-connection-source and nginx-connection-target 05:48:58 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:48:58 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:48:59 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:48:59 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:00 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:00 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:01 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:01 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:02 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:02 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:03 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:03 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:04 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:04 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:05 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:05 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:06 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:06 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:07 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:07 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:08 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:08 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:09 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:09 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:10 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:10 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:11 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:11 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:13 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:13 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:14 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:14 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:16 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:16 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:17 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:17 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:18 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:18 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:19 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:19 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:20 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:20 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:21 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:21 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:22 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:22 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:23 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:23 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:24 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:24 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:25 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:25 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:26 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:26 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:27 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:27 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:28 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:28 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:29 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:29 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:30 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:30 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:31 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:31 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:33 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:33 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:34 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:34 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:35 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:35 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:36 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:36 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:37 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:37 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:38 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:38 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:39 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:39 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id b118b034-f0b2-4ce7-8482-8b76f34fa024 -> edge target key: 3 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222535.9924000 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source b118b034-f0b2-4ce7-8482-8b76f34fa024 -> target 76ec901c-a740-47eb-aa1d-6715607ca7fa in graph after 42.154s 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId b118b034-f0b2-4ce7-8482-8b76f34fa024, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id b118b034-f0b2-4ce7-8482-8b76f34fa024 -> edge target key: 3 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222535.9924000 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify one-time connections show at first and are closed after the afterglow period PASSED NetworkFlowTest > Verify connections between StackRox Services STANDARD_OUT 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify connections between StackRox Services 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between sensor and central 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId de5d745c-970a-4aa7-a5ff-578a94a446c7, targetId 15939c21-56a2-4c32-8772-761f6e237ee2 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id de5d745c-970a-4aa7-a5ff-578a94a446c7 -> edge target key: 2 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 15939c21-56a2-4c32-8772-761f6e237ee2 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1764222580.539109546 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source de5d745c-970a-4aa7-a5ff-578a94a446c7 -> target 15939c21-56a2-4c32-8772-761f6e237ee2 in graph after 0.05s 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between collector and sensor 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 5981833b-d644-416a-badc-36057f988b09, targetId de5d745c-970a-4aa7-a5ff-578a94a446c7 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 5981833b-d644-416a-badc-36057f988b09 -> edge target key: 17 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: de5d745c-970a-4aa7-a5ff-578a94a446c7 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 8443 L4_PROTOCOL_TCP 1764222580.589031533 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source 5981833b-d644-416a-badc-36057f988b09 -> target de5d745c-970a-4aa7-a5ff-578a94a446c7 in graph after 0.05s 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify connections between StackRox Services PASSED NetworkFlowTest > Verify ports are greater than 0 SKIPPED NetworkFlowTest > Verify connections can be detected: #protocol > Verify connections can be detected: L4_PROTOCOL_UDP STANDARD_OUT 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify connections can be detected: L4_PROTOCOL_UDP 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between udp-connection-source and udp-connection-target 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 1f3820e8-dfc5-47a2-95d8-86c9db4066f7, targetId 9ea5a6f6-762a-43f8-a241-2950b7ca7c4a 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 1f3820e8-dfc5-47a2-95d8-86c9db4066f7 -> edge target key: 9 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 9ea5a6f6-762a-43f8-a241-2950b7ca7c4a 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 8080 L4_PROTOCOL_UDP 1764222580.659277223 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source 1f3820e8-dfc5-47a2-95d8-86c9db4066f7 -> target 9ea5a6f6-762a-43f8-a241-2950b7ca7c4a in graph after 0.049s 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify connections can be detected: #protocol > Verify connections can be detected: L4_PROTOCOL_UDP PASSED NetworkFlowTest > Verify connections can be detected: #protocol > Verify connections can be detected: L4_PROTOCOL_TCP STANDARD_OUT 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify connections can be detected: L4_PROTOCOL_TCP 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between tcp-connection-source and tcp-connection-target 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 83bc6397-e84d-48b8-90b7-a444cb4dea20, targetId 02d26d6f-122a-4c7d-9444-d21c63c3523d 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 83bc6397-e84d-48b8-90b7-a444cb4dea20 -> edge target key: 8 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 02d26d6f-122a-4c7d-9444-d21c63c3523d 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222580.729394141 05:49:40 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source 83bc6397-e84d-48b8-90b7-a444cb4dea20 -> target 02d26d6f-122a-4c7d-9444-d21c63c3523d in graph after 0.051s 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify connections can be detected: #protocol > Verify connections can be detected: L4_PROTOCOL_TCP PASSED NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: tcp-connection-target STANDARD_OUT 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify listen port availability matches feature flag: tcp-connection-target 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: tcp-connection-target PASSED NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: nginx-connection-target STANDARD_OUT 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify listen port availability matches feature flag: nginx-connection-target 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: nginx-connection-target PASSED NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: no-connection-source STANDARD_OUT 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify listen port availability matches feature flag: no-connection-source 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: no-connection-source PASSED NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: tcp-connection-source STANDARD_OUT 05:49:40 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify listen port availability matches feature flag: tcp-connection-source 05:49:41 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify listen port availability matches feature flag: #targetDeployment > Verify listen port availability matches feature flag: tcp-connection-source PASSED NetworkFlowTest > Verify connections with short consistent intervals between 2 deployments STANDARD_OUT 05:49:41 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify connections with short consistent intervals between 2 deployments 05:49:41 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between short-consistent-source and nginx-connection-target 05:49:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 3c7bbe56-ec2d-444f-a9bb-01e5029139de, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 3c7bbe56-ec2d-444f-a9bb-01e5029139de -> edge target key: 3 05:49:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222581.81237366 05:49:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source 3c7bbe56-ec2d-444f-a9bb-01e5029139de -> target 76ec901c-a740-47eb-aa1d-6715607ca7fa in graph after 0.05s 05:49:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 3c7bbe56-ec2d-444f-a9bb-01e5029139de, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 3c7bbe56-ec2d-444f-a9bb-01e5029139de -> edge target key: 3 05:49:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:41 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222581.130174514 05:49:42 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 3c7bbe56-ec2d-444f-a9bb-01e5029139de, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:42 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:42 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 3c7bbe56-ec2d-444f-a9bb-01e5029139de -> edge target key: 3 05:49:42 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:42 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222582.187467082 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Found updated edge in graph after 1.108s 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | The updated edge is 1 seconds later 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify connections with short consistent intervals between 2 deployments PASSED NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "" and scoped to "Orchestrator Component:false" contains non-orchestrator deployments only STANDARD_OUT 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify network graph when filtered on "" and scoped to "Orchestrator Component:false" contains non-orchestrator deployments only 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "" and scoped to "Orchestrator Component:false" contains non-orchestrator deployments only PASSED NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Orchestrator Component:false" and scoped to "" contains non-orchestrator deployments and connected orchestrator deployments STANDARD_OUT 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify network graph when filtered on "Orchestrator Component:false" and scoped to "" contains non-orchestrator deployments and connected orchestrator deployments 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Orchestrator Component:false" and scoped to "" contains non-orchestrator deployments and connected orchestrator deployments PASSED NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Orchestrator Component:true" and scoped to "Orchestrator Component:false" contains no deployments STANDARD_OUT 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify network graph when filtered on "Orchestrator Component:true" and scoped to "Orchestrator Component:false" contains no deployments 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Orchestrator Component:true" and scoped to "Orchestrator Component:false" contains no deployments PASSED NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Orchestrator Component:false" and scoped to "Orchestrator Component:true" contains no deployments STANDARD_OUT 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify network graph when filtered on "Orchestrator Component:false" and scoped to "Orchestrator Component:true" contains no deployments 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Orchestrator Component:false" and scoped to "Orchestrator Component:true" contains no deployments PASSED NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Namespace:stackrox" and scoped to "Orchestrator Component:false" contains stackrox deployments only STANDARD_OUT 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify network graph when filtered on "Namespace:stackrox" and scoped to "Orchestrator Component:false" contains stackrox deployments only 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify network graph when filtered on "#filter" and scoped to "#scope" #desc > Verify network graph when filtered on "Namespace:stackrox" and scoped to "Orchestrator Component:false" contains stackrox deployments only PASSED NetworkFlowTest > Verify network flows with graph filtering STANDARD_OUT 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify network flows with graph filtering 05:49:42 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for edge between tcp-connection-source and tcp-connection-target 05:49:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 83bc6397-e84d-48b8-90b7-a444cb4dea20, targetId 02d26d6f-122a-4c7d-9444-d21c63c3523d 05:49:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 83bc6397-e84d-48b8-90b7-a444cb4dea20 -> edge target key: 8 05:49:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 02d26d6f-122a-4c7d-9444-d21c63c3523d 05:49:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222583.15486780 05:49:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source 83bc6397-e84d-48b8-90b7-a444cb4dea20 -> target 02d26d6f-122a-4c7d-9444-d21c63c3523d in graph after 0.05s 05:49:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 83bc6397-e84d-48b8-90b7-a444cb4dea20, targetId 02d26d6f-122a-4c7d-9444-d21c63c3523d 05:49:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 83bc6397-e84d-48b8-90b7-a444cb4dea20 -> edge target key: 8 05:49:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 02d26d6f-122a-4c7d-9444-d21c63c3523d 05:49:43 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222583.64063001 05:49:44 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 83bc6397-e84d-48b8-90b7-a444cb4dea20, targetId 02d26d6f-122a-4c7d-9444-d21c63c3523d 05:49:44 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:44 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 83bc6397-e84d-48b8-90b7-a444cb4dea20 -> edge target key: 8 05:49:44 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 02d26d6f-122a-4c7d-9444-d21c63c3523d 05:49:44 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222584.115577267 05:49:44 | INFO | NetworkFlowTest | NetworkFlowTest | Found updated edge in graph after 1.1s 05:49:44 | INFO | NetworkFlowTest | NetworkFlowTest | The updated edge is 1 seconds later 05:49:44 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify network flows with graph filtering PASSED NetworkFlowTest > Verify connections to external sources SKIPPED NetworkFlowTest > Verify connections from external sources SKIPPED NetworkFlowTest > Verify intra-cluster connection via internal IP STANDARD_OUT 05:49:44 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify intra-cluster connection via internal IP 05:49:44 | INFO | NetworkFlowTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:49:44 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify intra-cluster connection via internal IP SKIPPED NetworkFlowTest > Verify no connections between 2 deployments STANDARD_OUT 05:49:44 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify no connections between 2 deployments 05:49:44 | INFO | NetworkFlowTest | NetworkFlowTest | Checking for NO edge between no-connection-source and nginx-connection-target 05:49:44 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:44 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:45 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:46 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:46 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:47 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:47 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:48 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:49 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:49 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:50 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:50 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:51 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:51 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:52 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:52 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:53 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:53 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:54 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:54 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:55 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:55 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:56 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:56 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:57 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:57 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:58 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:58 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:49:59 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:49:59 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:01 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:01 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:02 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:02 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:03 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:03 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:04 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:04 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:05 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:05 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:06 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:06 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:07 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:07 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:08 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:08 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:09 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:09 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:10 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:10 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:11 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:11 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:12 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:12 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:13 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:13 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:14 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:14 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId 033a3c6e-9037-44f9-8b1d-3453fedfc53f, targetId 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:15 | WARN | NetworkFlowTest | NetworkGraphUtil | SR did not detect the edge in Network Flow graph 05:50:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify no connections between 2 deployments PASSED NetworkFlowTest > Verify connections between two deployments on 2 separate ports shows both edges in the graph STANDARD_OUT 05:50:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify connections between two deployments on 2 separate ports shows both edges in the graph 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId c46f1af7-9f69-489f-b98a-edb205b1a17d, targetId 02d26d6f-122a-4c7d-9444-d21c63c3523d 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id c46f1af7-9f69-489f-b98a-edb205b1a17d -> edge target key: 8 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 02d26d6f-122a-4c7d-9444-d21c63c3523d 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 8080 L4_PROTOCOL_TCP 1764222615.838282788 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222615.838319998 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Found source c46f1af7-9f69-489f-b98a-edb205b1a17d -> target 02d26d6f-122a-4c7d-9444-d21c63c3523d in graph after 0.05s 05:50:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify connections between two deployments on 2 separate ports shows both edges in the graph PASSED NetworkFlowTest > Verify cluster updates can block flow connections from showing SKIPPED NetworkFlowTest > Verify edge timestamps are never in the future, or before start of flow tests STANDARD_OUT 05:50:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify edge timestamps are never in the future, or before start of flow tests 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId null 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Looking at edges for 12 source node(s) 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 3c7bbe56-ec2d-444f-a9bb-01e5029139de -> edge target key: 0 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222615.909180766 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 34a8c936-0b19-4a34-adf4-2afb450c2c33 -> edge target key: 11 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: afa12424-bde3-4313-b810-bb463cbe8f90 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222565.293646000 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id b118b034-f0b2-4ce7-8482-8b76f34fa024 -> edge target key: 0 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 76ec901c-a740-47eb-aa1d-6715607ca7fa 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222535.9924000 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 83bc6397-e84d-48b8-90b7-a444cb4dea20 -> edge target key: 5 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 02d26d6f-122a-4c7d-9444-d21c63c3523d 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222615.909183006 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 3e125a6e-4cf7-43e8-8f57-0937375d19fb -> edge target key: 5 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 02d26d6f-122a-4c7d-9444-d21c63c3523d 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222615.909182216 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id c46f1af7-9f69-489f-b98a-edb205b1a17d -> edge target key: 5 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 02d26d6f-122a-4c7d-9444-d21c63c3523d 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 8080 L4_PROTOCOL_TCP 1764222615.909181476 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 80 L4_PROTOCOL_TCP 1764222615.909186616 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | Source Id 1f3820e8-dfc5-47a2-95d8-86c9db4066f7 -> edge target key: 6 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> targetId: 9ea5a6f6-762a-43f8-a241-2950b7ca7c4a 05:50:15 | DEBUG | NetworkFlowTest | NetworkGraphUtil | -> edge: 8080 L4_PROTOCOL_UDP 1764222615.909182626 05:50:15 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify edge timestamps are never in the future, or before start of flow tests PASSED NetworkFlowTest > Verify generated network policies STANDARD_OUT 05:50:15 | INFO | NetworkFlowTest | NetworkFlowTest | Starting testcase: Verify generated network policies 05:50:15 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: no-connection-source 05:50:17 | INFO | NetworkFlowTest | Services | SR does not detect the deployment no-connection-source yet: io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id '033a3c6e-9037-44f9-8b1d-3453fedfc53f' does not exist: not found 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | Verifying graph edges of tcp-connection-target 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | tcp-connection-target has incoming connections 05:50:17 | DEBUG | NetworkFlowTest | NetworkFlowTest | sourceDeploymentsFromGraph: [two-ports-connect-source, tcp-connection-source, tcp-connection-source-qa2] 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | Verifying graph edges of udp-connection-target 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | udp-connection-target has incoming connections 05:50:17 | DEBUG | NetworkFlowTest | NetworkFlowTest | sourceDeploymentsFromGraph: [udp-connection-source] 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | nginx-connection-target has LB/External incoming traffic - ensure All Ingress allowed 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | single-connection-source has no incoming connections - ensure ingress spec is empty 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | tcp-connection-source-qa2 has no incoming connections - ensure ingress spec is empty 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | external-destination-source has no incoming connections - ensure ingress spec is empty 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | tcp-connection-target has incoming connections - ensure podSelectors/namespaceSelectors match sources from graph 05:50:17 | DEBUG | NetworkFlowTest | NetworkFlowTest | sourceDeploymentsFromNetworkPolicy: [two-ports-connect-source, tcp-connection-source-qa2, tcp-connection-source] 05:50:17 | DEBUG | NetworkFlowTest | NetworkFlowTest | sourceDeploymentsFromGraph: [two-ports-connect-source, tcp-connection-source, tcp-connection-source-qa2] 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | udp-connection-target has incoming connections - ensure podSelectors/namespaceSelectors match sources from graph 05:50:17 | DEBUG | NetworkFlowTest | NetworkFlowTest | sourceDeploymentsFromNetworkPolicy: [udp-connection-source] 05:50:17 | DEBUG | NetworkFlowTest | NetworkFlowTest | sourceDeploymentsFromGraph: [udp-connection-source] 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | tcp-connection-source has no incoming connections - ensure ingress spec is empty 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | short-consistent-source has no incoming connections - ensure ingress spec is empty 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | udp-connection-source has no incoming connections - ensure ingress spec is empty 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | two-ports-connect-source has no incoming connections - ensure ingress spec is empty 05:50:17 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testcase NetworkFlowTest > Verify generated network policies PASSED NetworkFlowTest > Apply a generated network policy and verify connection states SKIPPED NetworkFlowTest STANDARD_OUT 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: no-connection-source 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: short-consistent-source 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: single-connection-source 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: udp-connection-source 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: tcp-connection-source 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: two-ports-connect-source 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: external-destination-source 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: tcp-connection-source-qa2 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | udp-connection-target: Service deleting... 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | udp-connection-target: Service deleted 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: udp-connection-target 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | tcp-connection-target: Service deleting... 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | tcp-connection-target: Service deleted 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: tcp-connection-target 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | nginx-connection-target: Service deleting... 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | nginx-connection-target: Service deleted 05:50:17 | DEBUG | NetworkFlowTest | OpenShift | Deleting a route: nginx-connection-target 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Removed the deployment: nginx-connection-target 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service udp-connection-target to be deleted 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | udp-connection-target: service removed. 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service tcp-connection-target to be deleted 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | tcp-connection-target: service removed. 05:50:17 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service nginx-connection-target to be deleted 05:50:22 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service nginx-connection-target to be deleted 05:50:27 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service nginx-connection-target to be deleted 05:50:32 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service nginx-connection-target to be deleted 05:50:37 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service nginx-connection-target to be deleted 05:50:42 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for service nginx-connection-target to be deleted 05:50:42 | DEBUG | NetworkFlowTest | Kubernetes | nginx-connection-target: service removed. 05:50:42 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for namespace qa2 to be deleted 05:50:42 | DEBUG | NetworkFlowTest | Kubernetes | Retrying in 3... 05:50:45 | DEBUG | NetworkFlowTest | Kubernetes | Retrying in 3... 05:50:48 | DEBUG | NetworkFlowTest | Kubernetes | Retrying in 3... 05:50:51 | DEBUG | NetworkFlowTest | Kubernetes | K8s found that namespace qa2 was deleted 05:50:51 | DEBUG | NetworkFlowTest | Kubernetes | Waiting for namespace qa2 to be deleted 05:50:51 | DEBUG | NetworkFlowTest | Kubernetes | K8s found that namespace qa2 was deleted 05:50:56 | DEBUG | NetworkFlowTest | Kubernetes | collector-config: ConfigMap removed. 05:50:56 | INFO | NetworkFlowTest | NetworkFlowTest | Ending testsuite 05:50:56 | INFO | NetworkFlowTest | NetworkFlowTest | Checking if cluster is healthy after test 05:50:56 | DEBUG | NetworkFlowTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries NetworkSimulator STANDARD_OUT 05:50:56 | INFO | NetworkSimulator | NetworkSimulator | Starting testsuite 05:50:56 | DEBUG | NetworkSimulator | OpenShift | Namespace qa already exists 05:50:56 | DEBUG | NetworkSimulator | Kubernetes | Told the orchestrator to createOrReplace web 05:50:56 | DEBUG | NetworkSimulator | OpenShift | Namespace qa already exists 05:50:56 | DEBUG | NetworkSimulator | Kubernetes | Told the orchestrator to createOrReplace alt-web 05:50:57 | DEBUG | NetworkSimulator | OpenShift | Namespace qa already exists 05:50:57 | DEBUG | NetworkSimulator | Kubernetes | Told the orchestrator to createOrReplace client 05:50:57 | DEBUG | NetworkSimulator | OpenShift | Namespace qa already exists 05:50:57 | DEBUG | NetworkSimulator | Kubernetes | Told the orchestrator to createOrReplace alt-client 05:50:57 | DEBUG | NetworkSimulator | Kubernetes | Waiting for web to start 05:50:57 | DEBUG | NetworkSimulator | Kubernetes | Status of web's pods: 05:50:57 | DEBUG | NetworkSimulator | Kubernetes | - web-7cb99696b6-nkqq5 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:50:57 | DEBUG | NetworkSimulator | Kubernetes | 0/1 are in the ready state for web 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Waiting for web to start 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Status of web's pods: 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | - web-7cb99696b6-nkqq5 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:50:57Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | All 1 replicas found in ready state for web 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Took 3 seconds for k8s deployment web 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Updating deployment web with 1 pods 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Waiting for alt-web to start 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Status of alt-web's pods: 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | - alt-web-845549b468-nbn4v Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:50:57Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | All 1 replicas found in ready state for alt-web 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Took 0 seconds for k8s deployment alt-web 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Updating deployment alt-web with 1 pods 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Waiting for client to start 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Status of client's pods: 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | - client-5574847695-b2hr8 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:50:57Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | All 1 replicas found in ready state for client 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Took 0 seconds for k8s deployment client 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Updating deployment client with 1 pods 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Waiting for alt-client to start 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Status of alt-client's pods: 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | - alt-client-74b4cc4757-5fwl2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:50:57Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | All 1 replicas found in ready state for alt-client 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Took 0 seconds for k8s deployment alt-client 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | Updating deployment alt-client with 1 pods 05:51:00 | INFO | NetworkSimulator | Services | SR found deployment web within 0s 05:51:00 | INFO | NetworkSimulator | Services | SR found deployment alt-web within 0s 05:51:00 | INFO | NetworkSimulator | Services | SR found deployment client within 0s 05:51:00 | INFO | NetworkSimulator | Services | SR found deployment alt-client within 0s NetworkSimulator > Verify NetworkPolicy Simulator replace existing network policy > Verify NetworkPolicy Simulator replace existing network policy [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] STANDARD_OUT 05:51:00 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator replace existing network policy [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | deny-all-namespace-ingress: NetworkPolicy created: 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-namespace-ingress namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress 05:51:00 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:00 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:00 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:51:00 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:00 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:51:00 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:00 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | deny-all-namespace-ingress: NetworkPolicy removed. 05:51:00 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id 'c6692e46-0d51-4794-82f5-bac8678a9500' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_0(NetworkSimulator.groovy:118) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:00 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator replace existing network policy > Verify NetworkPolicy Simulator replace existing network policy [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] PASSED NetworkSimulator > Verify NetworkPolicy Simulator replace existing network policy > Verify NetworkPolicy Simulator replace existing network policy [scope: , orchestratorDepsShouldExist: true, #1] STANDARD_OUT 05:51:00 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator replace existing network policy [scope: , orchestratorDepsShouldExist: true, #1] 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | deny-all-namespace-ingress: NetworkPolicy created: 05:51:00 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-namespace-ingress namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress 05:51:00 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:00 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:00 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:00 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:00 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:00 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:00 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | deny-all-namespace-ingress: NetworkPolicy removed. 05:51:01 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '22593cda-6378-497f-843c-352efc60cd90' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_0(NetworkSimulator.groovy:118) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:01 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator replace existing network policy > Verify NetworkPolicy Simulator replace existing network policy [scope: , orchestratorDepsShouldExist: true, #1] PASSED NetworkSimulator > Verify NetworkPolicy Simulator add to an existing network policy > Verify NetworkPolicy Simulator add to an existing network policy [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] STANDARD_OUT 05:51:01 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator add to an existing network policy [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:51:01 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05a7356e-b6aa-444a-83ff-0c8b3ef05cca -> edge target key: 7 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 15939c21-56a2-4c32-8772-761f6e237ee2 -> edge target key: 7 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 19d51137-cdd2-43f5-8c0d-a3eed2cf6fc5 -> edge target key: 7 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 287c9856-293c-4d6d-a2f9-58e76c77dc01 -> edge target key: 7 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 42f7310c-a372-4988-89eb-2d431dfadd63 -> edge target key: 7 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5981833b-d644-416a-badc-36057f988b09 -> edge target key: 7 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8da3e008-673c-4392-808d-c8710ea8f75f -> edge target key: 7 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9df83bd6-5e7a-4c40-a5b1-e37924694620 -> edge target key: 7 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6f7d501-2829-4d50-bdd7-2e33c5ad5e2b -> edge target key: 7 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c425e1c2-c582-460b-ae60-f6f5970d111a -> edge target key: 7 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9945e00-939e-4026-9772-88956b00ebae -> edge target key: 7 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id de5d745c-970a-4aa7-a5ff-578a94a446c7 -> edge target key: 7 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f9a70cce-3aaf-4255-97f1-cdb538e9fb38 -> edge target key: 7 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b6e8c26b-bf80-4c74-97de-bbd047d24119, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b6e8c26b-bf80-4c74-97de-bbd047d24119, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:51:01 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '928c5984-fd01-48be-93af-b1f11646b583' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_1(NetworkSimulator.groovy:192) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:01 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator add to an existing network policy > Verify NetworkPolicy Simulator add to an existing network policy [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] PASSED NetworkSimulator > Verify NetworkPolicy Simulator add to an existing network policy > Verify NetworkPolicy Simulator add to an existing network policy [scope: , orchestratorDepsShouldExist: true, #1] STANDARD_OUT 05:51:01 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator add to an existing network policy [scope: , orchestratorDepsShouldExist: true, #1] 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:51:01 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0221edb7-4565-4d68-bf76-72c0ff75219b -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05a7356e-b6aa-444a-83ff-0c8b3ef05cca -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05a87b8e-0be3-44c3-891d-1486ca9f7a90 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 08d69cf9-bcee-4b69-a216-975b6e95a20a -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0a932cc5-7364-4344-b64c-7ad5c1a1e171 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cad2d0a-8a72-4fb5-88e2-d1f21f5a57f2 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cbd337e-ae5a-4d50-8200-16bb66e3704e -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cf38bc5-52f8-428d-87e2-e789a5a23678 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0dc95114-19d0-4746-bc5a-cfa99757f9c9 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0ff7c609-cc47-453d-b6f2-7200d039d863 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1200e344-d980-49e7-a8a7-8ce0a6407873 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 15863c8a-e943-4c75-a600-b9eb34e9d092 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 15939c21-56a2-4c32-8772-761f6e237ee2 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1656bebc-937c-49a5-99ce-e22389a0f928 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1901c87b-215b-4aa5-be6c-5770f96f6b33 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 19d51137-cdd2-43f5-8c0d-a3eed2cf6fc5 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 208704da-0e8c-44fd-9425-ef3f5cecb29b -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 25b01bca-162f-4a3d-8bbc-4310d31d3638 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 25dff0aa-76fb-41d3-90bb-b8fe740d3bbc -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2855e4e3-7916-4ef5-a518-5e4968d7a379 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 287c9856-293c-4d6d-a2f9-58e76c77dc01 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2897c798-36ca-4e2c-bd67-46c81b0b3898 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 30773881-544f-47a5-8f15-ca1f3476b7ec -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 321d048d-1795-4b0b-90de-ac5fceab9a1f -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 325a4567-7222-46fa-80e4-1e0aba4a266c -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3263b759-5a98-4ca7-bf94-d4fb1bdf4837 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 32cdb42e-eb2e-40f5-8318-b2df6483eef1 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 374caf39-904f-4f1f-a518-80eade9d5026 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3ce4693b-3890-4630-a9fe-316dc3d0532a -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 405daf56-3c9c-4cb2-8c30-5d8cfa330361 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 42b53c65-1ded-40df-b294-190b9a26b404 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 42f7310c-a372-4988-89eb-2d431dfadd63 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 45446e6a-46a3-4f5b-9594-04519f600628 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 455a10a2-b944-4e5b-8c3b-01195cb3929f -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4626f8fe-2cee-4f87-a762-7c2cfb1e44c6 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4720a939-0bb7-4521-9878-a301eaebb392 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4763b70d-211f-45c5-a49c-98c74c32f8a8 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 481a3484-872d-47cd-a75d-3ec0778c923d -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 48e82565-3d6d-4b18-abf9-cbe1743b937f -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 48ec8409-6da0-4045-9706-ed73650482e1 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4ad72d8e-bffa-4f9a-b50d-4a55334520f1 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4ef498e7-9f3d-4d36-80c7-3f7b81949373 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 51559523-88af-43ed-b6db-2128c57b55ac -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 54ad2e1b-6470-40ee-be19-b0c162540d65 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 55812777-a379-4fdc-a3ab-cb78702ae3b2 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5981833b-d644-416a-badc-36057f988b09 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5fffbd9c-a2de-438b-bf47-0879b6d599da -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 632c669c-ade0-47a8-b8cb-4bdd9e96af3a -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 63ecc789-7c38-49b6-85bf-ed3c897de379 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 64991e88-ebae-4a7c-a5fe-b0ba3cb1aba3 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 67d44d94-a794-4dbc-9f38-b257a9c533be -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 69ea1272-24f3-4e7a-8fd1-45728c53eba8 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6b7c088f-15ef-4216-a5e4-80c9fd942e48 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6c5e880e-2565-4f7b-9f68-5e8a3ed3f9e0 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6cdfe8fe-bd3f-4c65-8903-753bba96d3f8 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 730288a3-105e-4b20-9298-7e39da6ae4ae -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 766d4aac-4b8a-4e74-8150-94df9fc909de -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 76bae7c6-a996-4d46-a394-500ca3604c2a -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 77030939-596f-4c8e-8371-e5033cc0bce8 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7c8159e2-85ca-4e3d-962f-9360eab13874 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7cd92170-d526-492e-aa90-153027283f80 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 812a927d-e52a-4220-826b-62f89684cbe5 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 840adb79-6c43-4af8-9f81-18cb4d3a3b6e -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 85cea65f-9a04-4efc-8128-1a8f05ec7471 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 86a255f4-61ce-411f-bf47-23012b968023 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 884963c5-1582-4bd7-ac6b-5041375bac71 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 89673038-9830-4721-95c8-b4e84aafae35 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8b967b92-2e8b-4e8d-9c65-eca570de3298 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8da3e008-673c-4392-808d-c8710ea8f75f -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8de4bca4-88a2-4de4-a81d-1e52ee11ea1c -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8f093fb7-9c3e-4aa6-9332-f18f13934149 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8f747301-b17b-499d-8d25-19d55b5bc091 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9084a772-f840-4d16-b3a2-9cf02aa0304a -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 936254a2-a963-460d-926e-484a8af4d03e -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 93eb5c52-9ac5-4d52-a18f-f55430fa072c -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9984f3eb-7823-4591-928d-416abbd123ed -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9ac97417-ff55-4c06-a91c-88e4f4ae79ab -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9d5d2b42-64e6-461a-9b22-0e7e9f391b2a -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9df83bd6-5e7a-4c40-a5b1-e37924694620 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9e25e74a-3906-4c11-83e3-1321b309dd5a -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a12e1f49-2ba3-45b0-b292-acd85b860e37 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1f46bd4-2d63-4216-9a9e-004806141c74 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1f931b6-5ba1-45c5-91d9-0984feede893 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a66e6405-f834-4cf2-a93d-307f9061500d -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6a95a82-6ad6-41da-94f8-214661c200f5 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6f7d501-2829-4d50-bdd7-2e33c5ad5e2b -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id aad5c6f1-acb0-4f63-b739-68b569fdefc0 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id abf848e7-fb24-4a77-baa0-a4f0b3735b37 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b0dc28a4-191b-4141-8f96-a5f4d635ba07 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b1058d7d-5078-4806-9635-8e1455fd4015 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b80412ea-998e-43a0-aa6c-5cf6305f40d8 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bb0cea17-c296-4de2-836c-89880a3b62fb -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bcd3a1f7-35d8-448e-ae75-4ca7e5110a89 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf68f356-66c5-4888-bf4f-a797baad3693 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf9d1943-40a4-4894-a80f-ccd0c2d1eef4 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bfda8cd9-b4b6-40cf-8123-f946db6473a8 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c250c8dd-8c7c-40b6-bd5e-b0eb5bb6890d -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c32847fc-6f0f-493a-b4b3-e8c9a14fa31e -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c425e1c2-c582-460b-ae60-f6f5970d111a -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c6ba540d-5041-4819-9fbb-2b863a4bf967 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9945e00-939e-4026-9772-88956b00ebae -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9ca5484-7b64-41c6-ad0f-59f31c2ffcbb -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9d5a1b8-dd09-470e-9677-b42b9b3c01fd -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d187f4fe-7ede-4603-9d40-d8979a6ea556 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d4f63432-64ba-468a-a41d-acee75459b5c -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d5da9726-3fa9-4788-ba06-0d39bb3434d3 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d6c7e7c1-4f02-41a9-9930-bdc89fc1fa5c -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d6ea21db-1289-4524-9f4b-d6b1bf19c945 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d771e365-b56f-42fe-bc95-8bd931846141 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d8a52e8e-ba4f-447b-a017-d3836369893d -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d9f580c0-3c77-40e7-b1be-7580e76c294e -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d9f91fb1-615c-4bc1-af9e-2c7a79dc90c8 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id daee7ba1-92fe-4939-9b8b-e619ae249efa -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id de5d745c-970a-4aa7-a5ff-578a94a446c7 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id df47969d-7839-415f-a2ef-0f062695f94e -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e06b6dec-5e62-4473-bd8a-9155d036333a -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e12195e6-3478-44fb-b666-3341247cdbc5 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e17b2ff6-349b-479b-8ac4-2adb9a969d68 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e1908c75-516f-4d68-a32e-db51e46b27f4 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e37135b2-e92a-4ebd-ade0-027530d86ec3 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e45c03cc-569e-4cd8-97ba-a6c3a3621810 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e4e8cc5f-6d46-4360-a464-1b750cdfa2cb -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e8047181-93ab-4dc9-8dbc-b1ad16bf7677 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ebea07e0-3de4-47fc-963a-2ee0a085d3de -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ebfcb431-d867-4f34-9546-4628c6a51998 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f2ecc460-27d3-4128-bf2f-23d6c2c0d51e -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f4381ada-754a-4093-9e70-eae44f97ef51 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f6f1735f-68c1-4483-b761-242ddf10f484 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f760bb17-8e2f-4b65-9ff8-fca3d42037ed -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f9a70cce-3aaf-4255-97f1-cdb538e9fb38 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f9ac2f03-9725-4a8d-af90-dc585ebc62b2 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id fda70083-e2d8-43f0-8fc6-ccc785e8e06c -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id fe15fe24-586f-485e-b48b-f95326e06933 -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ff597cbb-2c26-462a-ab8f-1d115ff6fbff -> edge target key: 54 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b6e8c26b-bf80-4c74-97de-bbd047d24119, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b6e8c26b-bf80-4c74-97de-bbd047d24119, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:51:01 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id 'd1942216-c096-4cd8-8080-2cf37c55d752' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_1(NetworkSimulator.groovy:192) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:01 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator add to an existing network policy > Verify NetworkPolicy Simulator add to an existing network policy [scope: , orchestratorDepsShouldExist: true, #1] PASSED NetworkSimulator > Verify NetworkPolicy Simulator with query - multiple policy simulation > Verify NetworkPolicy Simulator with query - multiple policy simulation [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] STANDARD_OUT 05:51:01 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator with query - multiple policy simulation [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:51:01 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 2 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b6e8c26b-bf80-4c74-97de-bbd047d24119 -> edge target key: 0 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 2 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b6e8c26b-bf80-4c74-97de-bbd047d24119, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b6e8c26b-bf80-4c74-97de-bbd047d24119 -> edge target key: 0 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId afa12424-bde3-4313-b810-bb463cbe8f90, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Found no nodes matching sourceId afa12424-bde3-4313-b810-bb463cbe8f90 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:51:01 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '0373ac06-74a9-4099-87a6-987fb3a396d8' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_2(NetworkSimulator.groovy:284) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:01 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator with query - multiple policy simulation > Verify NetworkPolicy Simulator with query - multiple policy simulation [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] PASSED NetworkSimulator > Verify NetworkPolicy Simulator with query - multiple policy simulation > Verify NetworkPolicy Simulator with query - multiple policy simulation [scope: , orchestratorDepsShouldExist: false, #1] STANDARD_OUT 05:51:01 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator with query - multiple policy simulation [scope: , orchestratorDepsShouldExist: false, #1] 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:51:01 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 2 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b6e8c26b-bf80-4c74-97de-bbd047d24119 -> edge target key: 0 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 2 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b6e8c26b-bf80-4c74-97de-bbd047d24119, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b6e8c26b-bf80-4c74-97de-bbd047d24119 -> edge target key: 0 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId afa12424-bde3-4313-b810-bb463cbe8f90, targetId null 05:51:01 | DEBUG | NetworkSimulator | NetworkGraphUtil | Found no nodes matching sourceId afa12424-bde3-4313-b810-bb463cbe8f90 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:51:01 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '1e6415d7-c6cc-41d8-aed2-f7ca98d30848' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_2(NetworkSimulator.groovy:284) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:01 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator with query - multiple policy simulation > Verify NetworkPolicy Simulator with query - multiple policy simulation [scope: , orchestratorDepsShouldExist: false, #1] PASSED NetworkSimulator > Verify NetworkPolicy Simulator with query - single policy simulation > Verify NetworkPolicy Simulator with query - single policy simulation [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] STANDARD_OUT 05:51:01 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator with query - single policy simulation [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:51:01 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:51:02 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 14 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05a7356e-b6aa-444a-83ff-0c8b3ef05cca -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 15939c21-56a2-4c32-8772-761f6e237ee2 -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 19d51137-cdd2-43f5-8c0d-a3eed2cf6fc5 -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 287c9856-293c-4d6d-a2f9-58e76c77dc01 -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 42f7310c-a372-4988-89eb-2d431dfadd63 -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5981833b-d644-416a-badc-36057f988b09 -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8da3e008-673c-4392-808d-c8710ea8f75f -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9df83bd6-5e7a-4c40-a5b1-e37924694620 -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6f7d501-2829-4d50-bdd7-2e33c5ad5e2b -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c425e1c2-c582-460b-ae60-f6f5970d111a -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9945e00-939e-4026-9772-88956b00ebae -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id de5d745c-970a-4aa7-a5ff-578a94a446c7 -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f9a70cce-3aaf-4255-97f1-cdb538e9fb38 -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 15939c21-56a2-4c32-8772-761f6e237ee2, targetId null 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 15939c21-56a2-4c32-8772-761f6e237ee2 -> edge target key: 6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:51:02 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '86b15adf-acd7-44e9-9aa0-0c65e4ee2c38' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_3(NetworkSimulator.groovy:363) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:02 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator with query - single policy simulation > Verify NetworkPolicy Simulator with query - single policy simulation [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] PASSED NetworkSimulator > Verify NetworkPolicy Simulator with query - single policy simulation > Verify NetworkPolicy Simulator with query - single policy simulation [scope: , orchestratorDepsShouldExist: true, #1] STANDARD_OUT 05:51:02 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator with query - single policy simulation [scope: , orchestratorDepsShouldExist: true, #1] 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:51:02 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 135 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0221edb7-4565-4d68-bf76-72c0ff75219b -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05a7356e-b6aa-444a-83ff-0c8b3ef05cca -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05a87b8e-0be3-44c3-891d-1486ca9f7a90 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 08d69cf9-bcee-4b69-a216-975b6e95a20a -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0a932cc5-7364-4344-b64c-7ad5c1a1e171 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cad2d0a-8a72-4fb5-88e2-d1f21f5a57f2 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cbd337e-ae5a-4d50-8200-16bb66e3704e -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cf38bc5-52f8-428d-87e2-e789a5a23678 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0dc95114-19d0-4746-bc5a-cfa99757f9c9 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0ff7c609-cc47-453d-b6f2-7200d039d863 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1200e344-d980-49e7-a8a7-8ce0a6407873 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 15863c8a-e943-4c75-a600-b9eb34e9d092 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 15939c21-56a2-4c32-8772-761f6e237ee2 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1656bebc-937c-49a5-99ce-e22389a0f928 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1901c87b-215b-4aa5-be6c-5770f96f6b33 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 19d51137-cdd2-43f5-8c0d-a3eed2cf6fc5 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 208704da-0e8c-44fd-9425-ef3f5cecb29b -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 25b01bca-162f-4a3d-8bbc-4310d31d3638 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 25dff0aa-76fb-41d3-90bb-b8fe740d3bbc -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2855e4e3-7916-4ef5-a518-5e4968d7a379 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 287c9856-293c-4d6d-a2f9-58e76c77dc01 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2897c798-36ca-4e2c-bd67-46c81b0b3898 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 30773881-544f-47a5-8f15-ca1f3476b7ec -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 321d048d-1795-4b0b-90de-ac5fceab9a1f -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 325a4567-7222-46fa-80e4-1e0aba4a266c -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3263b759-5a98-4ca7-bf94-d4fb1bdf4837 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 32cdb42e-eb2e-40f5-8318-b2df6483eef1 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 374caf39-904f-4f1f-a518-80eade9d5026 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3ce4693b-3890-4630-a9fe-316dc3d0532a -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 405daf56-3c9c-4cb2-8c30-5d8cfa330361 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 42b53c65-1ded-40df-b294-190b9a26b404 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 42f7310c-a372-4988-89eb-2d431dfadd63 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 45446e6a-46a3-4f5b-9594-04519f600628 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 455a10a2-b944-4e5b-8c3b-01195cb3929f -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4626f8fe-2cee-4f87-a762-7c2cfb1e44c6 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4720a939-0bb7-4521-9878-a301eaebb392 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4763b70d-211f-45c5-a49c-98c74c32f8a8 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 481a3484-872d-47cd-a75d-3ec0778c923d -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 48e82565-3d6d-4b18-abf9-cbe1743b937f -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 48ec8409-6da0-4045-9706-ed73650482e1 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4ad72d8e-bffa-4f9a-b50d-4a55334520f1 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4ef498e7-9f3d-4d36-80c7-3f7b81949373 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 51559523-88af-43ed-b6db-2128c57b55ac -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 54ad2e1b-6470-40ee-be19-b0c162540d65 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 55812777-a379-4fdc-a3ab-cb78702ae3b2 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5981833b-d644-416a-badc-36057f988b09 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5fffbd9c-a2de-438b-bf47-0879b6d599da -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 632c669c-ade0-47a8-b8cb-4bdd9e96af3a -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 63ecc789-7c38-49b6-85bf-ed3c897de379 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 64991e88-ebae-4a7c-a5fe-b0ba3cb1aba3 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 67d44d94-a794-4dbc-9f38-b257a9c533be -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 69ea1272-24f3-4e7a-8fd1-45728c53eba8 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6b7c088f-15ef-4216-a5e4-80c9fd942e48 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6c5e880e-2565-4f7b-9f68-5e8a3ed3f9e0 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6cdfe8fe-bd3f-4c65-8903-753bba96d3f8 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 730288a3-105e-4b20-9298-7e39da6ae4ae -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 766d4aac-4b8a-4e74-8150-94df9fc909de -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 76bae7c6-a996-4d46-a394-500ca3604c2a -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 77030939-596f-4c8e-8371-e5033cc0bce8 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7c8159e2-85ca-4e3d-962f-9360eab13874 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7cd92170-d526-492e-aa90-153027283f80 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 812a927d-e52a-4220-826b-62f89684cbe5 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 840adb79-6c43-4af8-9f81-18cb4d3a3b6e -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 85cea65f-9a04-4efc-8128-1a8f05ec7471 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 86a255f4-61ce-411f-bf47-23012b968023 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 884963c5-1582-4bd7-ac6b-5041375bac71 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 89673038-9830-4721-95c8-b4e84aafae35 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8b967b92-2e8b-4e8d-9c65-eca570de3298 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8da3e008-673c-4392-808d-c8710ea8f75f -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8de4bca4-88a2-4de4-a81d-1e52ee11ea1c -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8f093fb7-9c3e-4aa6-9332-f18f13934149 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8f747301-b17b-499d-8d25-19d55b5bc091 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9084a772-f840-4d16-b3a2-9cf02aa0304a -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 936254a2-a963-460d-926e-484a8af4d03e -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 93eb5c52-9ac5-4d52-a18f-f55430fa072c -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9984f3eb-7823-4591-928d-416abbd123ed -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9ac97417-ff55-4c06-a91c-88e4f4ae79ab -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9d5d2b42-64e6-461a-9b22-0e7e9f391b2a -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9df83bd6-5e7a-4c40-a5b1-e37924694620 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9e25e74a-3906-4c11-83e3-1321b309dd5a -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a12e1f49-2ba3-45b0-b292-acd85b860e37 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1f46bd4-2d63-4216-9a9e-004806141c74 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1f931b6-5ba1-45c5-91d9-0984feede893 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a66e6405-f834-4cf2-a93d-307f9061500d -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6a95a82-6ad6-41da-94f8-214661c200f5 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6f7d501-2829-4d50-bdd7-2e33c5ad5e2b -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id aad5c6f1-acb0-4f63-b739-68b569fdefc0 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id abf848e7-fb24-4a77-baa0-a4f0b3735b37 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b0dc28a4-191b-4141-8f96-a5f4d635ba07 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b1058d7d-5078-4806-9635-8e1455fd4015 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b80412ea-998e-43a0-aa6c-5cf6305f40d8 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bb0cea17-c296-4de2-836c-89880a3b62fb -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bcd3a1f7-35d8-448e-ae75-4ca7e5110a89 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf68f356-66c5-4888-bf4f-a797baad3693 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf9d1943-40a4-4894-a80f-ccd0c2d1eef4 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bfda8cd9-b4b6-40cf-8123-f946db6473a8 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c250c8dd-8c7c-40b6-bd5e-b0eb5bb6890d -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c32847fc-6f0f-493a-b4b3-e8c9a14fa31e -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c425e1c2-c582-460b-ae60-f6f5970d111a -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c6ba540d-5041-4819-9fbb-2b863a4bf967 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9945e00-939e-4026-9772-88956b00ebae -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9ca5484-7b64-41c6-ad0f-59f31c2ffcbb -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9d5a1b8-dd09-470e-9677-b42b9b3c01fd -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d187f4fe-7ede-4603-9d40-d8979a6ea556 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d4f63432-64ba-468a-a41d-acee75459b5c -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d5da9726-3fa9-4788-ba06-0d39bb3434d3 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d6c7e7c1-4f02-41a9-9930-bdc89fc1fa5c -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d6ea21db-1289-4524-9f4b-d6b1bf19c945 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d771e365-b56f-42fe-bc95-8bd931846141 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d8a52e8e-ba4f-447b-a017-d3836369893d -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d9f580c0-3c77-40e7-b1be-7580e76c294e -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d9f91fb1-615c-4bc1-af9e-2c7a79dc90c8 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id daee7ba1-92fe-4939-9b8b-e619ae249efa -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id de5d745c-970a-4aa7-a5ff-578a94a446c7 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id df47969d-7839-415f-a2ef-0f062695f94e -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e06b6dec-5e62-4473-bd8a-9155d036333a -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e12195e6-3478-44fb-b666-3341247cdbc5 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e17b2ff6-349b-479b-8ac4-2adb9a969d68 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e1908c75-516f-4d68-a32e-db51e46b27f4 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e37135b2-e92a-4ebd-ade0-027530d86ec3 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e45c03cc-569e-4cd8-97ba-a6c3a3621810 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e4e8cc5f-6d46-4360-a464-1b750cdfa2cb -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e8047181-93ab-4dc9-8dbc-b1ad16bf7677 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ebea07e0-3de4-47fc-963a-2ee0a085d3de -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ebfcb431-d867-4f34-9546-4628c6a51998 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f2ecc460-27d3-4128-bf2f-23d6c2c0d51e -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f4381ada-754a-4093-9e70-eae44f97ef51 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f6f1735f-68c1-4483-b761-242ddf10f484 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f760bb17-8e2f-4b65-9ff8-fca3d42037ed -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f9a70cce-3aaf-4255-97f1-cdb538e9fb38 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f9ac2f03-9725-4a8d-af90-dc585ebc62b2 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id fda70083-e2d8-43f0-8fc6-ccc785e8e06c -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id fe15fe24-586f-485e-b48b-f95326e06933 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ff597cbb-2c26-462a-ab8f-1d115ff6fbff -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 15939c21-56a2-4c32-8772-761f6e237ee2, targetId null 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 15939c21-56a2-4c32-8772-761f6e237ee2 -> edge target key: 51 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:51:02 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '9d443432-4dc5-4e52-a5da-c0970824b42d' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_3(NetworkSimulator.groovy:363) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:02 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator with query - single policy simulation > Verify NetworkPolicy Simulator with query - single policy simulation [scope: , orchestratorDepsShouldExist: true, #1] PASSED NetworkSimulator > Verify NetworkPolicy Simulator with delete policies > Verify NetworkPolicy Simulator with delete policies [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] STANDARD_OUT 05:51:02 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator with delete policies [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | allow-ingress-application-web: NetworkPolicy created: 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: allow-ingress-application-web namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: - additionalProperties: {} from: - additionalProperties: {} namespaceSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} ports: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: app: web policyTypes: [] 05:51:02 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05a7356e-b6aa-444a-83ff-0c8b3ef05cca -> edge target key: 11 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 15939c21-56a2-4c32-8772-761f6e237ee2 -> edge target key: 11 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 19d51137-cdd2-43f5-8c0d-a3eed2cf6fc5 -> edge target key: 11 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 287c9856-293c-4d6d-a2f9-58e76c77dc01 -> edge target key: 11 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 42f7310c-a372-4988-89eb-2d431dfadd63 -> edge target key: 11 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5981833b-d644-416a-badc-36057f988b09 -> edge target key: 11 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8da3e008-673c-4392-808d-c8710ea8f75f -> edge target key: 11 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9df83bd6-5e7a-4c40-a5b1-e37924694620 -> edge target key: 11 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6f7d501-2829-4d50-bdd7-2e33c5ad5e2b -> edge target key: 11 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c425e1c2-c582-460b-ae60-f6f5970d111a -> edge target key: 11 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9945e00-939e-4026-9772-88956b00ebae -> edge target key: 11 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id de5d745c-970a-4aa7-a5ff-578a94a446c7 -> edge target key: 11 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f9a70cce-3aaf-4255-97f1-cdb538e9fb38 -> edge target key: 11 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 20 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 29 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b6e8c26b-bf80-4c74-97de-bbd047d24119, targetId null 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b6e8c26b-bf80-4c74-97de-bbd047d24119, targetId null 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | allow-ingress-application-web: NetworkPolicy removed. 05:51:02 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '4482e8c1-b393-45dd-8ba8-62261270b259' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_4(NetworkSimulator.groovy:455) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:02 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '170e16fa-f492-4656-ae38-1441a9a3bda9' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_4(NetworkSimulator.groovy:455) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:02 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator with delete policies > Verify NetworkPolicy Simulator with delete policies [scope: Orchestrator Component:false, orchestratorDepsShouldExist: false, #0] PASSED NetworkSimulator > Verify NetworkPolicy Simulator with delete policies > Verify NetworkPolicy Simulator with delete policies [scope: , orchestratorDepsShouldExist: true, #1] STANDARD_OUT 05:51:02 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator with delete policies [scope: , orchestratorDepsShouldExist: true, #1] 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy created: 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: deny-all-traffic namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} policyTypes: - Ingress - Egress 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | allow-ingress-application-web: NetworkPolicy created: 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | --- additionalProperties: {} apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: additionalProperties: {} annotations: {} finalizers: [] labels: {} managedFields: [] name: allow-ingress-application-web namespace: qa ownerReferences: [] spec: additionalProperties: {} egress: [] ingress: - additionalProperties: {} from: - additionalProperties: {} namespaceSelector: additionalProperties: {} matchExpressions: [] matchLabels: {} ports: [] podSelector: additionalProperties: {} matchExpressions: [] matchLabels: app: web policyTypes: [] 05:51:02 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0221edb7-4565-4d68-bf76-72c0ff75219b -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05a7356e-b6aa-444a-83ff-0c8b3ef05cca -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05a87b8e-0be3-44c3-891d-1486ca9f7a90 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 08d69cf9-bcee-4b69-a216-975b6e95a20a -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0a932cc5-7364-4344-b64c-7ad5c1a1e171 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cad2d0a-8a72-4fb5-88e2-d1f21f5a57f2 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cbd337e-ae5a-4d50-8200-16bb66e3704e -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cf38bc5-52f8-428d-87e2-e789a5a23678 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0dc95114-19d0-4746-bc5a-cfa99757f9c9 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0ff7c609-cc47-453d-b6f2-7200d039d863 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1200e344-d980-49e7-a8a7-8ce0a6407873 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 15863c8a-e943-4c75-a600-b9eb34e9d092 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 15939c21-56a2-4c32-8772-761f6e237ee2 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1656bebc-937c-49a5-99ce-e22389a0f928 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1901c87b-215b-4aa5-be6c-5770f96f6b33 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 19d51137-cdd2-43f5-8c0d-a3eed2cf6fc5 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 208704da-0e8c-44fd-9425-ef3f5cecb29b -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 25b01bca-162f-4a3d-8bbc-4310d31d3638 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 25dff0aa-76fb-41d3-90bb-b8fe740d3bbc -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2855e4e3-7916-4ef5-a518-5e4968d7a379 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 287c9856-293c-4d6d-a2f9-58e76c77dc01 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2897c798-36ca-4e2c-bd67-46c81b0b3898 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 30773881-544f-47a5-8f15-ca1f3476b7ec -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 321d048d-1795-4b0b-90de-ac5fceab9a1f -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 325a4567-7222-46fa-80e4-1e0aba4a266c -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3263b759-5a98-4ca7-bf94-d4fb1bdf4837 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 32cdb42e-eb2e-40f5-8318-b2df6483eef1 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 374caf39-904f-4f1f-a518-80eade9d5026 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3ce4693b-3890-4630-a9fe-316dc3d0532a -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 405daf56-3c9c-4cb2-8c30-5d8cfa330361 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 42b53c65-1ded-40df-b294-190b9a26b404 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 42f7310c-a372-4988-89eb-2d431dfadd63 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 45446e6a-46a3-4f5b-9594-04519f600628 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 455a10a2-b944-4e5b-8c3b-01195cb3929f -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4626f8fe-2cee-4f87-a762-7c2cfb1e44c6 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4720a939-0bb7-4521-9878-a301eaebb392 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4763b70d-211f-45c5-a49c-98c74c32f8a8 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 481a3484-872d-47cd-a75d-3ec0778c923d -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 48e82565-3d6d-4b18-abf9-cbe1743b937f -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 48ec8409-6da0-4045-9706-ed73650482e1 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4ad72d8e-bffa-4f9a-b50d-4a55334520f1 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4ef498e7-9f3d-4d36-80c7-3f7b81949373 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 51559523-88af-43ed-b6db-2128c57b55ac -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 54ad2e1b-6470-40ee-be19-b0c162540d65 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 55812777-a379-4fdc-a3ab-cb78702ae3b2 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5981833b-d644-416a-badc-36057f988b09 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5fffbd9c-a2de-438b-bf47-0879b6d599da -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 632c669c-ade0-47a8-b8cb-4bdd9e96af3a -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 63ecc789-7c38-49b6-85bf-ed3c897de379 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 64991e88-ebae-4a7c-a5fe-b0ba3cb1aba3 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 67d44d94-a794-4dbc-9f38-b257a9c533be -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 69ea1272-24f3-4e7a-8fd1-45728c53eba8 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6b7c088f-15ef-4216-a5e4-80c9fd942e48 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6c5e880e-2565-4f7b-9f68-5e8a3ed3f9e0 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6cdfe8fe-bd3f-4c65-8903-753bba96d3f8 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 730288a3-105e-4b20-9298-7e39da6ae4ae -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 766d4aac-4b8a-4e74-8150-94df9fc909de -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 76bae7c6-a996-4d46-a394-500ca3604c2a -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 77030939-596f-4c8e-8371-e5033cc0bce8 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7c8159e2-85ca-4e3d-962f-9360eab13874 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7cd92170-d526-492e-aa90-153027283f80 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 812a927d-e52a-4220-826b-62f89684cbe5 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 840adb79-6c43-4af8-9f81-18cb4d3a3b6e -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 85cea65f-9a04-4efc-8128-1a8f05ec7471 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 86a255f4-61ce-411f-bf47-23012b968023 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 884963c5-1582-4bd7-ac6b-5041375bac71 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 89673038-9830-4721-95c8-b4e84aafae35 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8b967b92-2e8b-4e8d-9c65-eca570de3298 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8da3e008-673c-4392-808d-c8710ea8f75f -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8de4bca4-88a2-4de4-a81d-1e52ee11ea1c -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8f093fb7-9c3e-4aa6-9332-f18f13934149 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8f747301-b17b-499d-8d25-19d55b5bc091 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9084a772-f840-4d16-b3a2-9cf02aa0304a -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 936254a2-a963-460d-926e-484a8af4d03e -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 93eb5c52-9ac5-4d52-a18f-f55430fa072c -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9984f3eb-7823-4591-928d-416abbd123ed -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9ac97417-ff55-4c06-a91c-88e4f4ae79ab -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9d5d2b42-64e6-461a-9b22-0e7e9f391b2a -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9df83bd6-5e7a-4c40-a5b1-e37924694620 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9e25e74a-3906-4c11-83e3-1321b309dd5a -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a12e1f49-2ba3-45b0-b292-acd85b860e37 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1f46bd4-2d63-4216-9a9e-004806141c74 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1f931b6-5ba1-45c5-91d9-0984feede893 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a66e6405-f834-4cf2-a93d-307f9061500d -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6a95a82-6ad6-41da-94f8-214661c200f5 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6f7d501-2829-4d50-bdd7-2e33c5ad5e2b -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id aad5c6f1-acb0-4f63-b739-68b569fdefc0 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id abf848e7-fb24-4a77-baa0-a4f0b3735b37 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b0dc28a4-191b-4141-8f96-a5f4d635ba07 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b1058d7d-5078-4806-9635-8e1455fd4015 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b80412ea-998e-43a0-aa6c-5cf6305f40d8 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bb0cea17-c296-4de2-836c-89880a3b62fb -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bcd3a1f7-35d8-448e-ae75-4ca7e5110a89 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf68f356-66c5-4888-bf4f-a797baad3693 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf9d1943-40a4-4894-a80f-ccd0c2d1eef4 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bfda8cd9-b4b6-40cf-8123-f946db6473a8 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c250c8dd-8c7c-40b6-bd5e-b0eb5bb6890d -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c32847fc-6f0f-493a-b4b3-e8c9a14fa31e -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c425e1c2-c582-460b-ae60-f6f5970d111a -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c6ba540d-5041-4819-9fbb-2b863a4bf967 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9945e00-939e-4026-9772-88956b00ebae -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9ca5484-7b64-41c6-ad0f-59f31c2ffcbb -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9d5a1b8-dd09-470e-9677-b42b9b3c01fd -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d187f4fe-7ede-4603-9d40-d8979a6ea556 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d4f63432-64ba-468a-a41d-acee75459b5c -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d5da9726-3fa9-4788-ba06-0d39bb3434d3 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d6c7e7c1-4f02-41a9-9930-bdc89fc1fa5c -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d6ea21db-1289-4524-9f4b-d6b1bf19c945 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d771e365-b56f-42fe-bc95-8bd931846141 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d8a52e8e-ba4f-447b-a017-d3836369893d -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d9f580c0-3c77-40e7-b1be-7580e76c294e -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d9f91fb1-615c-4bc1-af9e-2c7a79dc90c8 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id daee7ba1-92fe-4939-9b8b-e619ae249efa -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id de5d745c-970a-4aa7-a5ff-578a94a446c7 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id df47969d-7839-415f-a2ef-0f062695f94e -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e06b6dec-5e62-4473-bd8a-9155d036333a -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e12195e6-3478-44fb-b666-3341247cdbc5 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e17b2ff6-349b-479b-8ac4-2adb9a969d68 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e1908c75-516f-4d68-a32e-db51e46b27f4 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e37135b2-e92a-4ebd-ade0-027530d86ec3 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e45c03cc-569e-4cd8-97ba-a6c3a3621810 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e4e8cc5f-6d46-4360-a464-1b750cdfa2cb -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e8047181-93ab-4dc9-8dbc-b1ad16bf7677 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ebea07e0-3de4-47fc-963a-2ee0a085d3de -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ebfcb431-d867-4f34-9546-4628c6a51998 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f2ecc460-27d3-4128-bf2f-23d6c2c0d51e -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f4381ada-754a-4093-9e70-eae44f97ef51 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f6f1735f-68c1-4483-b761-242ddf10f484 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f760bb17-8e2f-4b65-9ff8-fca3d42037ed -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f9a70cce-3aaf-4255-97f1-cdb538e9fb38 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f9ac2f03-9725-4a8d-af90-dc585ebc62b2 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id fda70083-e2d8-43f0-8fc6-ccc785e8e06c -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id fe15fe24-586f-485e-b48b-f95326e06933 -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ff597cbb-2c26-462a-ab8f-1d115ff6fbff -> edge target key: 98 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 150 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b6e8c26b-bf80-4c74-97de-bbd047d24119, targetId null 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b6e8c26b-bf80-4c74-97de-bbd047d24119, targetId null 05:51:02 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | deny-all-traffic: NetworkPolicy removed. 05:51:02 | DEBUG | NetworkSimulator | Kubernetes | allow-ingress-application-web: NetworkPolicy removed. 05:51:02 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id '416b0a76-2c1e-40fb-91ef-9b8f34e85393' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_4(NetworkSimulator.groovy:455) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:02 | ERROR | NetworkSimulator | NetworkPolicyService | SR did not detect the network policy io.grpc.StatusRuntimeException: NOT_FOUND: network policy with id 'e6dbb870-12a4-4052-92a1-22aba7a159da' does not exist: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.getNetworkPolicy(NetworkPolicyServiceGrpc.java:804) [3 skipped] at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy:126) at services.NetworkPolicyService.waitForNetworkPolicyRemoval(NetworkPolicyService.groovy) at Services$_cleanupNetworkPolicies_closure8.doCall(Services.groovy:561) at Services$_cleanupNetworkPolicies_closure8.call(Services.groovy) at Services.cleanupNetworkPolicies(Services.groovy:559) [3 skipped] at NetworkSimulator.$spock_feature_1_4(NetworkSimulator.groovy:455) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:02 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator with delete policies > Verify NetworkPolicy Simulator with delete policies [scope: , orchestratorDepsShouldExist: true, #1] PASSED NetworkSimulator > Verify NetworkPolicy Simulator allow traffic to an application from all namespaces STANDARD_OUT 05:51:02 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator allow traffic to an application from all namespaces 05:51:02 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0221edb7-4565-4d68-bf76-72c0ff75219b -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05a7356e-b6aa-444a-83ff-0c8b3ef05cca -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 05a87b8e-0be3-44c3-891d-1486ca9f7a90 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 08d69cf9-bcee-4b69-a216-975b6e95a20a -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0a932cc5-7364-4344-b64c-7ad5c1a1e171 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cad2d0a-8a72-4fb5-88e2-d1f21f5a57f2 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cbd337e-ae5a-4d50-8200-16bb66e3704e -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0cf38bc5-52f8-428d-87e2-e789a5a23678 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0dc95114-19d0-4746-bc5a-cfa99757f9c9 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 0ff7c609-cc47-453d-b6f2-7200d039d863 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1200e344-d980-49e7-a8a7-8ce0a6407873 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 15863c8a-e943-4c75-a600-b9eb34e9d092 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 15939c21-56a2-4c32-8772-761f6e237ee2 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1656bebc-937c-49a5-99ce-e22389a0f928 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 1901c87b-215b-4aa5-be6c-5770f96f6b33 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 19d51137-cdd2-43f5-8c0d-a3eed2cf6fc5 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 208704da-0e8c-44fd-9425-ef3f5cecb29b -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 25b01bca-162f-4a3d-8bbc-4310d31d3638 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 25dff0aa-76fb-41d3-90bb-b8fe740d3bbc -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2855e4e3-7916-4ef5-a518-5e4968d7a379 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 287c9856-293c-4d6d-a2f9-58e76c77dc01 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 2897c798-36ca-4e2c-bd67-46c81b0b3898 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 30773881-544f-47a5-8f15-ca1f3476b7ec -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 321d048d-1795-4b0b-90de-ac5fceab9a1f -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 325a4567-7222-46fa-80e4-1e0aba4a266c -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3263b759-5a98-4ca7-bf94-d4fb1bdf4837 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 32cdb42e-eb2e-40f5-8318-b2df6483eef1 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 374caf39-904f-4f1f-a518-80eade9d5026 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 3ce4693b-3890-4630-a9fe-316dc3d0532a -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 405daf56-3c9c-4cb2-8c30-5d8cfa330361 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 42b53c65-1ded-40df-b294-190b9a26b404 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 42f7310c-a372-4988-89eb-2d431dfadd63 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 45446e6a-46a3-4f5b-9594-04519f600628 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 455a10a2-b944-4e5b-8c3b-01195cb3929f -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4626f8fe-2cee-4f87-a762-7c2cfb1e44c6 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4720a939-0bb7-4521-9878-a301eaebb392 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4763b70d-211f-45c5-a49c-98c74c32f8a8 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 481a3484-872d-47cd-a75d-3ec0778c923d -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 48e82565-3d6d-4b18-abf9-cbe1743b937f -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 48ec8409-6da0-4045-9706-ed73650482e1 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4ad72d8e-bffa-4f9a-b50d-4a55334520f1 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 4ef498e7-9f3d-4d36-80c7-3f7b81949373 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 51559523-88af-43ed-b6db-2128c57b55ac -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 54ad2e1b-6470-40ee-be19-b0c162540d65 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 55812777-a379-4fdc-a3ab-cb78702ae3b2 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5981833b-d644-416a-badc-36057f988b09 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 5fffbd9c-a2de-438b-bf47-0879b6d599da -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 632c669c-ade0-47a8-b8cb-4bdd9e96af3a -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 63ecc789-7c38-49b6-85bf-ed3c897de379 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 64991e88-ebae-4a7c-a5fe-b0ba3cb1aba3 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 67d44d94-a794-4dbc-9f38-b257a9c533be -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 69ea1272-24f3-4e7a-8fd1-45728c53eba8 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6b7c088f-15ef-4216-a5e4-80c9fd942e48 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6c5e880e-2565-4f7b-9f68-5e8a3ed3f9e0 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 6cdfe8fe-bd3f-4c65-8903-753bba96d3f8 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 730288a3-105e-4b20-9298-7e39da6ae4ae -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 766d4aac-4b8a-4e74-8150-94df9fc909de -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 76bae7c6-a996-4d46-a394-500ca3604c2a -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 77030939-596f-4c8e-8371-e5033cc0bce8 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7c8159e2-85ca-4e3d-962f-9360eab13874 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 7cd92170-d526-492e-aa90-153027283f80 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 812a927d-e52a-4220-826b-62f89684cbe5 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 840adb79-6c43-4af8-9f81-18cb4d3a3b6e -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 85cea65f-9a04-4efc-8128-1a8f05ec7471 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 86a255f4-61ce-411f-bf47-23012b968023 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 884963c5-1582-4bd7-ac6b-5041375bac71 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 89673038-9830-4721-95c8-b4e84aafae35 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8b967b92-2e8b-4e8d-9c65-eca570de3298 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8da3e008-673c-4392-808d-c8710ea8f75f -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8de4bca4-88a2-4de4-a81d-1e52ee11ea1c -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8f093fb7-9c3e-4aa6-9332-f18f13934149 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 8f747301-b17b-499d-8d25-19d55b5bc091 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9084a772-f840-4d16-b3a2-9cf02aa0304a -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 936254a2-a963-460d-926e-484a8af4d03e -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 93eb5c52-9ac5-4d52-a18f-f55430fa072c -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9984f3eb-7823-4591-928d-416abbd123ed -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9ac97417-ff55-4c06-a91c-88e4f4ae79ab -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9d5d2b42-64e6-461a-9b22-0e7e9f391b2a -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9df83bd6-5e7a-4c40-a5b1-e37924694620 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 9e25e74a-3906-4c11-83e3-1321b309dd5a -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a12e1f49-2ba3-45b0-b292-acd85b860e37 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1f46bd4-2d63-4216-9a9e-004806141c74 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a1f931b6-5ba1-45c5-91d9-0984feede893 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a66e6405-f834-4cf2-a93d-307f9061500d -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6a95a82-6ad6-41da-94f8-214661c200f5 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id a6f7d501-2829-4d50-bdd7-2e33c5ad5e2b -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id aad5c6f1-acb0-4f63-b739-68b569fdefc0 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id abf848e7-fb24-4a77-baa0-a4f0b3735b37 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b0dc28a4-191b-4141-8f96-a5f4d635ba07 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b1058d7d-5078-4806-9635-8e1455fd4015 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b80412ea-998e-43a0-aa6c-5cf6305f40d8 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bb0cea17-c296-4de2-836c-89880a3b62fb -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bcd3a1f7-35d8-448e-ae75-4ca7e5110a89 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf68f356-66c5-4888-bf4f-a797baad3693 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bf9d1943-40a4-4894-a80f-ccd0c2d1eef4 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id bfda8cd9-b4b6-40cf-8123-f946db6473a8 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c250c8dd-8c7c-40b6-bd5e-b0eb5bb6890d -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c32847fc-6f0f-493a-b4b3-e8c9a14fa31e -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c425e1c2-c582-460b-ae60-f6f5970d111a -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c6ba540d-5041-4819-9fbb-2b863a4bf967 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9945e00-939e-4026-9772-88956b00ebae -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9ca5484-7b64-41c6-ad0f-59f31c2ffcbb -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id c9d5a1b8-dd09-470e-9677-b42b9b3c01fd -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d187f4fe-7ede-4603-9d40-d8979a6ea556 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d4f63432-64ba-468a-a41d-acee75459b5c -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d5da9726-3fa9-4788-ba06-0d39bb3434d3 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d6c7e7c1-4f02-41a9-9930-bdc89fc1fa5c -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d6ea21db-1289-4524-9f4b-d6b1bf19c945 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d771e365-b56f-42fe-bc95-8bd931846141 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d8a52e8e-ba4f-447b-a017-d3836369893d -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d9f580c0-3c77-40e7-b1be-7580e76c294e -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id d9f91fb1-615c-4bc1-af9e-2c7a79dc90c8 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id daee7ba1-92fe-4939-9b8b-e619ae249efa -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id de5d745c-970a-4aa7-a5ff-578a94a446c7 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id df47969d-7839-415f-a2ef-0f062695f94e -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e06b6dec-5e62-4473-bd8a-9155d036333a -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e12195e6-3478-44fb-b666-3341247cdbc5 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e17b2ff6-349b-479b-8ac4-2adb9a969d68 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e1908c75-516f-4d68-a32e-db51e46b27f4 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e37135b2-e92a-4ebd-ade0-027530d86ec3 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e45c03cc-569e-4cd8-97ba-a6c3a3621810 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e4e8cc5f-6d46-4360-a464-1b750cdfa2cb -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id e8047181-93ab-4dc9-8dbc-b1ad16bf7677 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ebea07e0-3de4-47fc-963a-2ee0a085d3de -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ebfcb431-d867-4f34-9546-4628c6a51998 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f2ecc460-27d3-4128-bf2f-23d6c2c0d51e -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f4381ada-754a-4093-9e70-eae44f97ef51 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f6f1735f-68c1-4483-b761-242ddf10f484 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f760bb17-8e2f-4b65-9ff8-fca3d42037ed -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f9a70cce-3aaf-4255-97f1-cdb538e9fb38 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f9ac2f03-9725-4a8d-af90-dc585ebc62b2 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id fda70083-e2d8-43f0-8fc6-ccc785e8e06c -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id fe15fe24-586f-485e-b48b-f95326e06933 -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id ff597cbb-2c26-462a-ab8f-1d115ff6fbff -> edge target key: 54 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId b6e8c26b-bf80-4c74-97de-bbd047d24119, targetId null 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:03 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator allow traffic to an application from all namespaces PASSED NetworkSimulator > Verify yaml requires namespace in metadata STANDARD_OUT 05:51:03 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify yaml requires namespace in metadata 05:51:03 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:03 | ERROR | NetworkSimulator | NetworkPolicyService | Error generating simulation using YAML io.grpc.StatusRuntimeException: INVALID_ARGUMENT: invalid arguments: yamls tested against must apply to a namespace at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.simulateNetworkGraph(NetworkPolicyServiceGrpc.java:846) [3 skipped] at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy:81) at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy) at NetworkSimulator.$spock_feature_1_6(NetworkSimulator.groovy:537) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:03 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify yaml requires namespace in metadata PASSED NetworkSimulator > Verify malformed yaml returns error STANDARD_OUT 05:51:03 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify malformed yaml returns error 05:51:03 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:03 | ERROR | NetworkSimulator | NetworkPolicyService | Error generating simulation using YAML io.grpc.StatusRuntimeException: INTERNAL: invalid Yaml document separator: additionalProperties:{}apiVersion:networking.k8s.io/v1kind:NetworkPolicymetadata:additionalProperties:{}annotations:{}finalizers:[]labels:{}managedFields:[]name:missing-namespaceownerReferences:[]spec:additionalProperties:{}egress:[]ingress:[]policyTypes:[] at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.simulateNetworkGraph(NetworkPolicyServiceGrpc.java:846) [3 skipped] at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy:81) at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy) at NetworkSimulator.$spock_feature_1_7(NetworkSimulator.groovy:550) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:03 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:03 | ERROR | NetworkSimulator | NetworkPolicyService | Error generating simulation using YAML io.grpc.StatusRuntimeException: INTERNAL: error converting YAML to JSON: yaml: line 18: could not find expected ':' at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.simulateNetworkGraph(NetworkPolicyServiceGrpc.java:846) [3 skipped] at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy:81) at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy) at NetworkSimulator.$spock_feature_1_7(NetworkSimulator.groovy:552) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:03 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:03 | ERROR | NetworkSimulator | NetworkPolicyService | Error generating simulation using YAML io.grpc.StatusRuntimeException: INTERNAL: error converting YAML to JSON: yaml: line 3: could not find expected ':' at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.simulateNetworkGraph(NetworkPolicyServiceGrpc.java:846) [3 skipped] at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy:81) at services.NetworkPolicyService.submitNetworkGraphSimulation(NetworkPolicyService.groovy) at NetworkSimulator.$spock_feature_1_7(NetworkSimulator.groovy:556) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:03 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify malformed yaml returns error PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-ingress-to-app STANDARD_OUT 05:51:03 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-ingress-to-app 05:51:03 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:03 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-ingress-to-app PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-egress-from-app STANDARD_OUT 05:51:03 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-egress-from-app 05:51:03 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:03 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-egress-from-app PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-ingress-egress-app STANDARD_OUT 05:51:03 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-ingress-egress-app 05:51:03 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:03 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:03 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-ingress-egress-app PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for ingress-only-from-app STANDARD_OUT 05:51:03 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for ingress-only-from-app 05:51:03 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f33a2dd9-93aa-4852-a84b-6839379ccb40 -> edge target key: 54 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for ingress-only-from-app PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for egress-only-to-app STANDARD_OUT 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for egress-only-to-app 05:51:04 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 68266271-7f08-481d-9d8b-e0b75a3210f6 -> edge target key: 137 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: f33a2dd9-93aa-4852-a84b-6839379ccb40 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for egress-only-to-app PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-ingress STANDARD_OUT 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-ingress 05:51:04 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-ingress PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-egress STANDARD_OUT 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-egress 05:51:04 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-egress PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-namespace-ingress STANDARD_OUT 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-namespace-ingress 05:51:04 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId null, targetId 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 148 source node(s) 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id b6e8c26b-bf80-4c74-97de-bbd047d24119 -> edge target key: 54 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f33a2dd9-93aa-4852-a84b-6839379ccb40 -> edge target key: 54 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id f7f4bc54-3151-426f-b533-9f3225e2b3b2 -> edge target key: 54 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: 68266271-7f08-481d-9d8b-e0b75a3210f6 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-namespace-ingress PASSED NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-namespace-egress STANDARD_OUT 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify NetworkPolicy Simulator results for deny-all-namespace-egress 05:51:04 | DEBUG | NetworkSimulator | NetworkPolicyService | Generating simulation using YAML: %s 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Checking for edge between deployments: sourceId 68266271-7f08-481d-9d8b-e0b75a3210f6, targetId null 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Looking at edges for 1 source node(s) 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 68266271-7f08-481d-9d8b-e0b75a3210f6 -> edge target key: 141 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: f7f4bc54-3151-426f-b533-9f3225e2b3b2 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 68266271-7f08-481d-9d8b-e0b75a3210f6 -> edge target key: 137 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: f33a2dd9-93aa-4852-a84b-6839379ccb40 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | Source Id 68266271-7f08-481d-9d8b-e0b75a3210f6 -> edge target key: 98 05:51:04 | DEBUG | NetworkSimulator | NetworkGraphUtil | -> targetId: b6e8c26b-bf80-4c74-97de-bbd047d24119 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify NetworkPolicy Simulator results for #policy.name > Verify NetworkPolicy Simulator results for deny-all-namespace-egress PASSED NetworkSimulator > Verify invalid clusterId passed to notification API STANDARD_OUT 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify invalid clusterId passed to notification API 05:51:04 | DEBUG | NetworkSimulator | Helpers | Calling services.NotifierService.addNotifier with 3 retries 05:51:04 | ERROR | NetworkSimulator | NetworkPolicyService | io.grpc.StatusRuntimeException: NOT_FOUND: Cluster '11111111-bbbb-0000-aaaa-111111111111' not found: not found io.grpc.StatusRuntimeException: NOT_FOUND: Cluster '11111111-bbbb-0000-aaaa-111111111111' not found: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.sendNetworkPolicyYAML(NetworkPolicyServiceGrpc.java:853) [3 skipped] at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:101) at NetworkSimulator.$spock_feature_1_9(NetworkSimulator.groovy:686) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:04 | ERROR | NetworkSimulator | NetworkPolicyService | io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Cluster ID must be specified: invalid arguments io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Cluster ID must be specified: invalid arguments at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.sendNetworkPolicyYAML(NetworkPolicyServiceGrpc.java:853) [3 skipped] at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:101) at NetworkSimulator.$spock_feature_1_9(NetworkSimulator.groovy:690) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:04 | ERROR | NetworkSimulator | NetworkPolicyService | io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Cluster ID must be specified: invalid arguments io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Cluster ID must be specified: invalid arguments at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.sendNetworkPolicyYAML(NetworkPolicyServiceGrpc.java:853) [3 skipped] at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:101) at NetworkSimulator.$spock_feature_1_9(NetworkSimulator.groovy:694) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify invalid clusterId passed to notification API PASSED NetworkSimulator > Verify invalid notifierId passed to notification API STANDARD_OUT 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Starting testcase: Verify invalid notifierId passed to notification API 05:51:04 | ERROR | NetworkSimulator | NetworkPolicyService | io.grpc.StatusRuntimeException: INTERNAL: unable to use all requested notifiers error: notifier with id:11111111-bbbb-0000-aaaa-111111111111 not found io.grpc.StatusRuntimeException: INTERNAL: unable to use all requested notifiers error: notifier with id:11111111-bbbb-0000-aaaa-111111111111 not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.sendNetworkPolicyYAML(NetworkPolicyServiceGrpc.java:853) [3 skipped] at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:101) at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:90) at NetworkSimulator.$spock_feature_1_10(NetworkSimulator.groovy:715) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:04 | ERROR | NetworkSimulator | NetworkPolicyService | io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Notifier IDs must be specified: invalid arguments io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Notifier IDs must be specified: invalid arguments at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.sendNetworkPolicyYAML(NetworkPolicyServiceGrpc.java:853) [3 skipped] at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:101) at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:90) at NetworkSimulator.$spock_feature_1_10(NetworkSimulator.groovy:718) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:04 | ERROR | NetworkSimulator | NetworkPolicyService | io.grpc.StatusRuntimeException: INTERNAL: unable to use all requested notifiers error: notifier with id: not found io.grpc.StatusRuntimeException: INTERNAL: unable to use all requested notifiers error: notifier with id: not found at io.stackrox.proto.api.v1.NetworkPolicyServiceGrpc$NetworkPolicyServiceBlockingStub.sendNetworkPolicyYAML(NetworkPolicyServiceGrpc.java:853) [3 skipped] at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:101) at services.NetworkPolicyService.sendSimulationNotification(NetworkPolicyService.groovy:90) at NetworkSimulator.$spock_feature_1_10(NetworkSimulator.groovy:721) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [8 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:51:04 | INFO | NetworkSimulator | NetworkSimulator | Ending testcase NetworkSimulator > Verify invalid notifierId passed to notification API PASSED NetworkSimulator STANDARD_OUT 05:51:04 | DEBUG | NetworkSimulator | Kubernetes | Removed the deployment: web 05:51:05 | DEBUG | NetworkSimulator | Kubernetes | Removed the deployment: alt-web 05:51:05 | DEBUG | NetworkSimulator | Kubernetes | Removed the deployment: client 05:51:05 | DEBUG | NetworkSimulator | Kubernetes | Removed the deployment: alt-client 05:51:05 | INFO | NetworkSimulator | NetworkSimulator | Ending testsuite 05:51:05 | INFO | NetworkSimulator | NetworkSimulator | Checking if cluster is healthy after test 05:51:05 | DEBUG | NetworkSimulator | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries NodeInventoryTest > Verify node inventories and their scans SKIPPED NodeTest STANDARD_OUT 05:51:05 | INFO | NodeTest | NodeTest | Starting testsuite NodeTest > Verify node details STANDARD_OUT 05:51:05 | INFO | NodeTest | NodeTest | Starting testcase: Verify node details 05:51:05 | INFO | NodeTest | Helpers | Removing long annotation value from comparison: key: k8s.ovn.org/l3-gateway-config, length: 285 05:51:05 | INFO | NodeTest | Helpers | Removing long annotation value from comparison: key: k8s.ovn.org/l3-gateway-config, length: 284 05:51:05 | INFO | NodeTest | Helpers | Removing long annotation value from comparison: key: k8s.ovn.org/l3-gateway-config, length: 290 05:51:05 | INFO | NodeTest | Helpers | Removing long annotation value from comparison: key: k8s.ovn.org/l3-gateway-config, length: 279 05:51:05 | INFO | NodeTest | Helpers | Removing long annotation value from comparison: key: k8s.ovn.org/l3-gateway-config, length: 285 05:51:05 | INFO | NodeTest | Helpers | Removing long annotation value from comparison: key: k8s.ovn.org/l3-gateway-config, length: 282 05:51:05 | INFO | NodeTest | NodeTest | Ending testcase NodeTest > Verify node details PASSED NodeTest STANDARD_OUT 05:51:05 | INFO | NodeTest | NodeTest | Ending testsuite 05:51:05 | INFO | NodeTest | NodeTest | Checking if cluster is healthy after test 05:51:05 | DEBUG | NodeTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries PaginationTest STANDARD_OUT 05:51:05 | INFO | PaginationTest | PaginationTest | Starting testsuite 05:51:05 | DEBUG | PaginationTest | Kubernetes | pagination-secret-1: secret created. 05:51:05 | DEBUG | PaginationTest | Kubernetes | pagination-secret-2: secret created. 05:51:05 | DEBUG | PaginationTest | Kubernetes | pagination-secret-3: secret created. 05:51:05 | DEBUG | PaginationTest | Kubernetes | pagination-secret-4: secret created. 05:51:05 | DEBUG | PaginationTest | Kubernetes | pagination-secret-5: secret created. 05:51:05 | DEBUG | PaginationTest | Kubernetes | pagination-secret-6: secret created. 05:51:05 | DEBUG | PaginationTest | OpenShift | Namespace qa already exists 05:51:05 | DEBUG | PaginationTest | Kubernetes | Told the orchestrator to createOrReplace pagination1 05:51:05 | DEBUG | PaginationTest | OpenShift | Namespace qa already exists 05:51:05 | DEBUG | PaginationTest | Kubernetes | Told the orchestrator to createOrReplace pagination2 05:51:05 | DEBUG | PaginationTest | OpenShift | Namespace qa already exists 05:51:05 | DEBUG | PaginationTest | Kubernetes | Told the orchestrator to createOrReplace pagination3 05:51:05 | DEBUG | PaginationTest | OpenShift | Namespace qa already exists 05:51:05 | DEBUG | PaginationTest | Kubernetes | Told the orchestrator to createOrReplace pagination4 05:51:05 | DEBUG | PaginationTest | OpenShift | Namespace qa already exists 05:51:06 | DEBUG | PaginationTest | Kubernetes | Told the orchestrator to createOrReplace pagination5 05:51:06 | DEBUG | PaginationTest | OpenShift | Namespace qa already exists 05:51:06 | DEBUG | PaginationTest | Kubernetes | Told the orchestrator to createOrReplace pagination6 05:51:06 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination1 to start 05:51:06 | DEBUG | PaginationTest | Kubernetes | Status of pagination1's pods: 05:51:06 | DEBUG | PaginationTest | Kubernetes | - pagination1-d4b84d687-2kmpx Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:51:06 | DEBUG | PaginationTest | Kubernetes | 0/1 are in the ready state for pagination1 05:51:09 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination1 to start 05:51:09 | DEBUG | PaginationTest | Kubernetes | Status of pagination1's pods: 05:51:09 | DEBUG | PaginationTest | Kubernetes | - pagination1-d4b84d687-2kmpx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:51:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:09 | DEBUG | PaginationTest | Kubernetes | All 1 replicas found in ready state for pagination1 05:51:09 | DEBUG | PaginationTest | Kubernetes | Took 3 seconds for k8s deployment pagination1 05:51:09 | DEBUG | PaginationTest | Kubernetes | Updating deployment pagination1 with 1 pods 05:51:09 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination2 to start 05:51:09 | DEBUG | PaginationTest | Kubernetes | Status of pagination2's pods: 05:51:09 | DEBUG | PaginationTest | Kubernetes | - pagination2-849d86cc8c-fsw42 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:51:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:09 | DEBUG | PaginationTest | Kubernetes | All 1 replicas found in ready state for pagination2 05:51:09 | DEBUG | PaginationTest | Kubernetes | Took 0 seconds for k8s deployment pagination2 05:51:09 | DEBUG | PaginationTest | Kubernetes | Updating deployment pagination2 with 1 pods 05:51:09 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination3 to start 05:51:09 | DEBUG | PaginationTest | Kubernetes | Status of pagination3's pods: 05:51:09 | DEBUG | PaginationTest | Kubernetes | - pagination3-c5fbb47bc-8kpv9 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:51:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:09 | DEBUG | PaginationTest | Kubernetes | All 1 replicas found in ready state for pagination3 05:51:09 | DEBUG | PaginationTest | Kubernetes | Took 0 seconds for k8s deployment pagination3 05:51:09 | DEBUG | PaginationTest | Kubernetes | Updating deployment pagination3 with 1 pods 05:51:09 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination4 to start 05:51:09 | DEBUG | PaginationTest | Kubernetes | Status of pagination4's pods: 05:51:09 | DEBUG | PaginationTest | Kubernetes | - pagination4-687f56d7b6-z8s4k Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:51:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:09 | DEBUG | PaginationTest | Kubernetes | All 1 replicas found in ready state for pagination4 05:51:09 | DEBUG | PaginationTest | Kubernetes | Took 0 seconds for k8s deployment pagination4 05:51:09 | DEBUG | PaginationTest | Kubernetes | Updating deployment pagination4 with 1 pods 05:51:09 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination5 to start 05:51:09 | DEBUG | PaginationTest | Kubernetes | Status of pagination5's pods: 05:51:09 | DEBUG | PaginationTest | Kubernetes | - pagination5-7bdb9b9678-bzgp9 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:51:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:09 | DEBUG | PaginationTest | Kubernetes | All 1 replicas found in ready state for pagination5 05:51:09 | DEBUG | PaginationTest | Kubernetes | Took 0 seconds for k8s deployment pagination5 05:51:09 | DEBUG | PaginationTest | Kubernetes | Updating deployment pagination5 with 1 pods 05:51:09 | DEBUG | PaginationTest | Kubernetes | Waiting for pagination6 to start 05:51:09 | DEBUG | PaginationTest | Kubernetes | Status of pagination6's pods: 05:51:09 | DEBUG | PaginationTest | Kubernetes | - pagination6-7547bcc67d-hxnq8 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:51:06Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:51:09 | DEBUG | PaginationTest | Kubernetes | All 1 replicas found in ready state for pagination6 05:51:09 | DEBUG | PaginationTest | Kubernetes | Took 0 seconds for k8s deployment pagination6 05:51:09 | DEBUG | PaginationTest | Kubernetes | Updating deployment pagination6 with 1 pods 05:51:09 | INFO | PaginationTest | Services | SR found deployment pagination1 within 0s 05:51:23 | INFO | PaginationTest | Services | SR found image quay.io/rhacs-eng/qa-multi-arch:busybox-1-32 within 13s 05:51:23 | INFO | PaginationTest | Services | SR found deployment pagination2 within 0s 05:51:36 | INFO | PaginationTest | Services | SR found image quay.io/rhacs-eng/qa-multi-arch:busybox-1-31 within 13s 05:51:36 | INFO | PaginationTest | Services | SR found deployment pagination3 within 0s 05:51:50 | INFO | PaginationTest | Services | SR found image quay.io/rhacs-eng/qa-multi-arch:busybox-1-30 within 13s 05:51:50 | INFO | PaginationTest | Services | SR found deployment pagination4 within 0s 05:52:04 | INFO | PaginationTest | Services | SR found image quay.io/rhacs-eng/qa-multi-arch:busybox-1-29 within 13s 05:52:04 | INFO | PaginationTest | Services | SR found deployment pagination5 within 0s 05:52:17 | INFO | PaginationTest | Services | SR found image quay.io/rhacs-eng/qa-multi-arch:busybox-1-28 within 13s 05:52:17 | INFO | PaginationTest | Services | SR found deployment pagination6 within 0s 05:52:31 | INFO | PaginationTest | Services | SR found image quay.io/rhacs-eng/qa-multi-arch:busybox-1-27 within 13s PaginationTest > Verify deployment pagination STANDARD_OUT 05:52:31 | INFO | PaginationTest | PaginationTest | Starting testcase: Verify deployment pagination 05:52:31 | INFO | PaginationTest | PaginationTest | Ending testcase PaginationTest > Verify deployment pagination PASSED PaginationTest > Verify image pagination STANDARD_OUT 05:52:31 | INFO | PaginationTest | PaginationTest | Starting testcase: Verify image pagination 05:52:31 | INFO | PaginationTest | PaginationTest | Ending testcase PaginationTest > Verify image pagination PASSED PaginationTest > Verify secret pagination STANDARD_OUT 05:52:31 | INFO | PaginationTest | PaginationTest | Starting testcase: Verify secret pagination 05:52:31 | INFO | PaginationTest | PaginationTest | Ending testcase PaginationTest > Verify secret pagination PASSED PaginationTest > Verify violation pagination STANDARD_OUT 05:52:31 | INFO | PaginationTest | PaginationTest | Starting testcase: Verify violation pagination 05:52:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:52:31 | INFO | PaginationTest | Services | violation size is: 1 05:52:31 | INFO | PaginationTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 05:52:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:52:31 | INFO | PaginationTest | Services | violation size is: 1 05:52:31 | INFO | PaginationTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 05:52:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:52:31 | INFO | PaginationTest | Services | violation size is: 1 05:52:31 | INFO | PaginationTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 05:52:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:52:31 | INFO | PaginationTest | Services | violation size is: 1 05:52:31 | INFO | PaginationTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 05:52:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:52:31 | INFO | PaginationTest | Services | violation size is: 1 05:52:31 | INFO | PaginationTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 05:52:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:52:31 | INFO | PaginationTest | Services | violation size is: 1 05:52:31 | INFO | PaginationTest | Services | No CPU request or memory limit specified triggered after waiting 0 seconds 05:52:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:52:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:52:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:52:31 | DEBUG | PaginationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:52:31 | INFO | PaginationTest | PaginationTest | Ending testcase PaginationTest > Verify violation pagination PASSED PaginationTest STANDARD_OUT 05:52:31 | DEBUG | PaginationTest | Kubernetes | Removed the deployment: pagination1 05:52:31 | DEBUG | PaginationTest | Kubernetes | Removed the deployment: pagination2 05:52:32 | DEBUG | PaginationTest | Kubernetes | Removed the deployment: pagination3 05:52:32 | DEBUG | PaginationTest | Kubernetes | Removed the deployment: pagination4 05:52:32 | DEBUG | PaginationTest | Kubernetes | Removed the deployment: pagination5 05:52:32 | DEBUG | PaginationTest | Kubernetes | Removed the deployment: pagination6 05:52:37 | DEBUG | PaginationTest | Kubernetes | pagination-secret-1: Secret removed. 05:52:42 | DEBUG | PaginationTest | Kubernetes | pagination-secret-2: Secret removed. 05:52:47 | DEBUG | PaginationTest | Kubernetes | pagination-secret-3: Secret removed. 05:52:52 | DEBUG | PaginationTest | Kubernetes | pagination-secret-4: Secret removed. 05:52:57 | DEBUG | PaginationTest | Kubernetes | pagination-secret-5: Secret removed. 05:53:02 | DEBUG | PaginationTest | Kubernetes | pagination-secret-6: Secret removed. 05:53:02 | INFO | PaginationTest | PaginationTest | Ending testsuite 05:53:02 | INFO | PaginationTest | PaginationTest | Checking if cluster is healthy after test 05:53:02 | DEBUG | PaginationTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries PolicyConfigurationTest STANDARD_OUT 05:53:02 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testsuite 05:53:02 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:53:02 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace deploymentnginx 05:53:02 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:53:02 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace qadefpolstruts 05:53:02 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:53:02 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace qaapachedns 05:53:02 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:53:02 | DEBUG | PolicyConfigurationTest | Kubernetes | deploymentnginx-lb service created 05:53:02 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for LB external IP for deploymentnginx-lb 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | LB IP: af185a22a04994a5b9d4aa0c4cb85c2c-734073398.XXXXXXXXX.elb.amazonaws.com 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace deploymentnginx-lb 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for LB external IP for deploymentnginx-lb 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | LB IP: af185a22a04994a5b9d4aa0c4cb85c2c-734073398.XXXXXXXXX.elb.amazonaws.com 05:53:06 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace deploymentnginx-np 05:53:06 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace deployment-rbac 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for deploymentnginx to start 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of deploymentnginx's pods: 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | - deploymentnginx-5dff8668d6-dr7n6 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:53:03Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for deploymentnginx 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 0 seconds for k8s deployment deploymentnginx 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment deploymentnginx with 1 pods 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for qadefpolstruts to start 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of qadefpolstruts's pods: 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | - qadefpolstruts-7777989f97-f7sfn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:53:03Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for qadefpolstruts 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 0 seconds for k8s deployment qadefpolstruts 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment qadefpolstruts with 1 pods 05:53:06 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for qaapachedns to start 05:53:07 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of qaapachedns's pods: 05:53:07 | DEBUG | PolicyConfigurationTest | Kubernetes | - qaapachedns-7f587955b6-266dh Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:53:03Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:07 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for qaapachedns 05:53:07 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 0 seconds for k8s deployment qaapachedns 05:53:07 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment qaapachedns with 1 pods 05:53:07 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for deploymentnginx-lb to start 05:53:07 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of deploymentnginx-lb's pods: 05:53:07 | DEBUG | PolicyConfigurationTest | Kubernetes | - deploymentnginx-lb-7c98c5c59-pggxh Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:53:07 | DEBUG | PolicyConfigurationTest | Kubernetes | 0/1 are in the ready state for deploymentnginx-lb 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for deploymentnginx-lb to start 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of deploymentnginx-lb's pods: 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | - deploymentnginx-lb-7c98c5c59-pggxh Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:53:07Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for deploymentnginx-lb 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 3 seconds for k8s deployment deploymentnginx-lb 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment deploymentnginx-lb with 1 pods 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for deploymentnginx-np to start 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of deploymentnginx-np's pods: 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | - deploymentnginx-np-d85448655-7kgpl Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:53:07Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for deploymentnginx-np 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 0 seconds for k8s deployment deploymentnginx-np 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment deploymentnginx-np with 1 pods 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for deployment-rbac to start 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of deployment-rbac's pods: 05:53:10 | DEBUG | PolicyConfigurationTest | Kubernetes | - deployment-rbac-7b4d6f7c85-dqcx4 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=back-off 10s restarting failed container=deployment-rbac pod=deployment-rbac-7b4d6f7c85-dqcx4_qa(f177ce5d-fc07-4d8a-bc59-32f416af51e2), reason=CrashLoopBackOff, additionalProperties={}), additionalProperties={})] 05:53:15 | DEBUG | PolicyConfigurationTest | Kubernetes | deployment-rbac: deployment created (skipped replica wait). 05:53:15 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment deployment-rbac with 1 pods 05:53:15 | INFO | PolicyConfigurationTest | Services | SR found deployment deploymentnginx within 0s 05:53:15 | INFO | PolicyConfigurationTest | Services | SR found deployment qadefpolstruts within 0s 05:53:15 | INFO | PolicyConfigurationTest | Services | SR found deployment qaapachedns within 0s 05:53:15 | INFO | PolicyConfigurationTest | Services | SR found deployment deploymentnginx-lb within 0s 05:53:15 | INFO | PolicyConfigurationTest | Services | SR found deployment deploymentnginx-np within 0s 05:53:15 | INFO | PolicyConfigurationTest | Services | deploymentID for [deployment-rbac] is null, checking orchestrator directly for deployment ID 05:53:15 | INFO | PolicyConfigurationTest | Services | SR found deployment deployment-rbac within 0s 05:53:15 | DEBUG | PolicyConfigurationTest | Kubernetes | deploymentnginx-np: Service created PolicyConfigurationTest > Verify name violations with same ID as existing image are still triggered STANDARD_OUT 05:53:15 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify name violations with same ID as existing image are still triggered 05:53:15 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:53:15 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace nginx-1-12-1-with-tag-and-digest 05:53:15 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for nginx-1-12-1-with-tag-and-digest to start 05:53:15 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of nginx-1-12-1-with-tag-and-digest's pods: 05:53:15 | DEBUG | PolicyConfigurationTest | Kubernetes | - nginx-1-12-1-with-tag-and-digest-7bff56f785-9lfrv Container status: [] 05:53:15 | DEBUG | PolicyConfigurationTest | Kubernetes | 0/1 are in the ready state for nginx-1-12-1-with-tag-and-digest 05:53:18 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for nginx-1-12-1-with-tag-and-digest to start 05:53:18 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of nginx-1-12-1-with-tag-and-digest's pods: 05:53:18 | DEBUG | PolicyConfigurationTest | Kubernetes | - nginx-1-12-1-with-tag-and-digest-7bff56f785-9lfrv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:53:16Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:18 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for nginx-1-12-1-with-tag-and-digest 05:53:18 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 3 seconds for k8s deployment nginx-1-12-1-with-tag-and-digest 05:53:18 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment nginx-1-12-1-with-tag-and-digest with 1 pods 05:53:18 | DEBUG | PolicyConfigurationTest | OpenShift | Namespace qa already exists 05:53:18 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace nginx-latest 05:53:18 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for nginx-latest to start 05:53:18 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of nginx-latest's pods: 05:53:18 | DEBUG | PolicyConfigurationTest | Kubernetes | - nginx-latest-f6cb69878-9jx77 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:53:18 | DEBUG | PolicyConfigurationTest | Kubernetes | 0/1 are in the ready state for nginx-latest 05:53:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Waiting for nginx-latest to start 05:53:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Status of nginx-latest's pods: 05:53:21 | DEBUG | PolicyConfigurationTest | Kubernetes | - nginx-latest-f6cb69878-9jx77 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:53:19Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:53:21 | DEBUG | PolicyConfigurationTest | Kubernetes | All 1 replicas found in ready state for nginx-latest 05:53:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Took 3 seconds for k8s deployment nginx-latest 05:53:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Updating deployment nginx-latest with 1 pods 05:53:21 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:21 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:53:21 | INFO | PolicyConfigurationTest | Services | Latest Tag triggered after waiting 0 seconds 05:53:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Has violation true 05:53:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: nginx-1-12-1-with-tag-and-digest 05:53:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: nginx-latest 05:53:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify name violations with same ID as existing image are still triggered PASSED PolicyConfigurationTest > Verify lastUpdated field is updated correctly for policy - ROX-3971 production bug STANDARD_OUT 05:53:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify lastUpdated field is updated correctly for policy - ROX-3971 production bug 05:53:24 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify lastUpdated field is updated correctly for policy - ROX-3971 production bug PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Image Tag can be triggered STANDARD_OUT 05:53:24 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Image Tag can be triggered 05:53:24 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:27 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:27 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:53:27 | INFO | PolicyConfigurationTest | Services | TestImageTagPolicy triggered after waiting 3 seconds 05:53:27 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Image Tag can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Image Remote can be triggered STANDARD_OUT 05:53:27 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Image Remote can be triggered 05:53:28 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:31 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:31 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:53:31 | INFO | PolicyConfigurationTest | Services | TestImageRemotePolicy triggered after waiting 3 seconds 05:53:31 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Image Remote can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Days since image was created can be triggered STANDARD_OUT 05:53:31 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Days since image was created can be triggered 05:53:31 | ERROR | PolicyConfigurationTest | PolicyService | error deleting policy java.lang.NullPointerException: null at io.stackrox.proto.api.v1.Common$ResourceByID$Builder.setId(Common.java:457) at services.PolicyService.deletePolicy(PolicyService.groovy:55) [2 skipped] at PolicyConfigurationTest.$spock_feature_1_2(PolicyConfigurationTest.groovy:259) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:53:31 | INFO | PolicyConfigurationTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:53:31 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Days since image was created can be triggered SKIPPED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Dockerfile Line can be triggered STANDARD_OUT 05:53:31 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Dockerfile Line can be triggered 05:53:31 | ERROR | PolicyConfigurationTest | PolicyService | error deleting policy java.lang.NullPointerException: null at io.stackrox.proto.api.v1.Common$ResourceByID$Builder.setId(Common.java:457) at services.PolicyService.deletePolicy(PolicyService.groovy:55) [1 skipped] at PolicyConfigurationTest.$spock_feature_1_2(PolicyConfigurationTest.groovy:259) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:53:31 | INFO | PolicyConfigurationTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:53:31 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Dockerfile Line can be triggered SKIPPED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration CVE is available can be triggered STANDARD_OUT 05:53:31 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration CVE is available can be triggered 05:53:31 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Deleting image quay.io/rhacs-eng/qa-multi-arch:nginx-1.12@sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728 from DB 05:53:31 | DEBUG | PolicyConfigurationTest | ImageService | Deleted 1 images based on Image:quay.io/rhacs-eng/qa-multi-arch:nginx-1.12@sha256:72daaf46f11cc753c4eab981cbf869919bd1fee3d2170a2adeac12400f494728 05:53:31 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:34 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:34 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:53:34 | INFO | PolicyConfigurationTest | Services | TestCVEPolicy triggered after waiting 3 seconds 05:53:34 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration CVE is available can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Port can be triggered STANDARD_OUT 05:53:34 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Port can be triggered 05:53:34 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:37 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:37 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:53:37 | INFO | PolicyConfigurationTest | Services | TestPortPolicy triggered after waiting 3 seconds 05:53:37 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Port can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Port Exposure through Load Balancer can be triggered STANDARD_OUT 05:53:37 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Port Exposure through Load Balancer can be triggered 05:53:38 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:41 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:41 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:53:41 | INFO | PolicyConfigurationTest | Services | TestPortExposurePolicy triggered after waiting 3 seconds 05:53:41 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Port Exposure through Load Balancer can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Port Exposure by Node Port can be triggered STANDARD_OUT 05:53:41 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Port Exposure by Node Port can be triggered 05:53:41 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:41 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:53:41 | INFO | PolicyConfigurationTest | Services | TestPortExposurePolicy triggered after waiting 0 seconds 05:53:41 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Port Exposure by Node Port can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Required Label can be triggered STANDARD_OUT 05:53:41 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Required Label can be triggered 05:53:41 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:44 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:44 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:53:44 | INFO | PolicyConfigurationTest | Services | TestLabelPolicy triggered after waiting 3 seconds 05:53:44 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Required Label can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Required Annotations can be triggered STANDARD_OUT 05:53:44 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Required Annotations can be triggered 05:53:44 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:48 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:48 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:53:48 | INFO | PolicyConfigurationTest | Services | TestAnnotationPolicy triggered after waiting 3 seconds 05:53:48 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Required Annotations can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Environment Variable is available can be triggered STANDARD_OUT 05:53:48 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Environment Variable is available can be triggered 05:53:48 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:51 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:51 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:53:51 | INFO | PolicyConfigurationTest | Services | TestEnvironmentPolicy triggered after waiting 3 seconds 05:53:51 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Environment Variable is available can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Container Port can be triggered STANDARD_OUT 05:53:51 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Container Port can be triggered 05:53:51 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:54 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:54 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:53:54 | INFO | PolicyConfigurationTest | Services | TestContainerPortPolicy triggered after waiting 3 seconds 05:53:54 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Container Port can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Privileged can be triggered STANDARD_OUT 05:53:54 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Privileged can be triggered 05:53:54 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:57 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:53:57 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:53:57 | INFO | PolicyConfigurationTest | Services | TestPrivilegedPolicy triggered after waiting 3 seconds 05:53:58 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Privileged can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Protocol can be triggered STANDARD_OUT 05:53:58 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Protocol can be triggered 05:53:58 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:01 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:01 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:54:01 | INFO | PolicyConfigurationTest | Services | TestProtocolPolicy triggered after waiting 3 seconds 05:54:01 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Protocol can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Protocol (case-insensitive) can be triggered STANDARD_OUT 05:54:01 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Protocol (case-insensitive) can be triggered 05:54:01 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:01 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:54:01 | INFO | PolicyConfigurationTest | Services | TestProtocolPolicy triggered after waiting 0 seconds 05:54:01 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Protocol (case-insensitive) can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Limits can be triggered STANDARD_OUT 05:54:01 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Limits can be triggered 05:54:01 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:04 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:04 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:54:04 | INFO | PolicyConfigurationTest | Services | TestLimitsPolicy triggered after waiting 3 seconds 05:54:05 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Limits can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Requests can be triggered STANDARD_OUT 05:54:05 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Requests can be triggered 05:54:05 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:08 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:08 | INFO | PolicyConfigurationTest | Services | violation size is: 3 05:54:08 | INFO | PolicyConfigurationTest | Services | TestRequestsPolicy triggered after waiting 3 seconds 05:54:08 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Requests can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration VolumeName can be triggered STANDARD_OUT 05:54:08 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration VolumeName can be triggered 05:54:08 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:11 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:11 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:54:11 | INFO | PolicyConfigurationTest | Services | TestVolumeNamePolicy triggered after waiting 3 seconds 05:54:11 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration VolumeName can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration HostMount Writable Volume can be triggered STANDARD_OUT 05:54:11 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration HostMount Writable Volume can be triggered 05:54:11 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:14 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:14 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:54:14 | INFO | PolicyConfigurationTest | Services | TestwritableHostmountPolicy triggered after waiting 3 seconds 05:54:14 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration HostMount Writable Volume can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Writable Volume can be triggered STANDARD_OUT 05:54:14 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration Writable Volume can be triggered 05:54:15 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:18 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:18 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:54:18 | INFO | PolicyConfigurationTest | Services | TestWritableVolumePolicy triggered after waiting 3 seconds 05:54:18 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration Writable Volume can be triggered PASSED PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration RBAC API access can be triggered STANDARD_OUT 05:54:18 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy configuration RBAC API access can be triggered 05:54:18 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:21 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:21 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:54:21 | INFO | PolicyConfigurationTest | Services | Test RBAC API Access Policy triggered after waiting 3 seconds 05:54:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy configuration #policyName can be triggered > Verify policy configuration RBAC API access can be triggered PASSED PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source SECRET_KEY fails validation STANDARD_OUT 05:54:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify env var policy configuration for source SECRET_KEY fails validation 05:54:21 | ERROR | PolicyConfigurationTest | PolicyService | error creating new policy io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid error: error validating lifecycle stage error: policy configuration is invalid for deploy time: policy validation error: validation of section "" error: policy criteria "Environment Variable" has invalid value[0]="KEY=VALUE" must match regex "((?m)^(?i:(UNSET|RAW|UNKNOWN|^)=([^=]*)=.*)|((SECRET_KEY|CONFIG_MAP_KEY|FIELD|RESOURCE_FIELD)=([^=]*)=$)$)": invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.postPolicy(PolicyServiceGrpc.java:1022) [3 skipped] at services.PolicyService.createNewPolicy(PolicyService.groovy:31) [1 skipped] at PolicyConfigurationTest.$spock_feature_1_3(PolicyConfigurationTest.groovy:714) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:54:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source SECRET_KEY fails validation PASSED PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source CONFIG_MAP_KEY fails validation STANDARD_OUT 05:54:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify env var policy configuration for source CONFIG_MAP_KEY fails validation 05:54:21 | ERROR | PolicyConfigurationTest | PolicyService | error creating new policy io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid error: error validating lifecycle stage error: policy configuration is invalid for deploy time: policy validation error: validation of section "" error: policy criteria "Environment Variable" has invalid value[0]="KEY=VALUE" must match regex "((?m)^(?i:(UNSET|RAW|UNKNOWN|^)=([^=]*)=.*)|((SECRET_KEY|CONFIG_MAP_KEY|FIELD|RESOURCE_FIELD)=([^=]*)=$)$)": invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.postPolicy(PolicyServiceGrpc.java:1022) [3 skipped] at services.PolicyService.createNewPolicy(PolicyService.groovy:31) [1 skipped] at PolicyConfigurationTest.$spock_feature_1_3(PolicyConfigurationTest.groovy:714) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:54:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source CONFIG_MAP_KEY fails validation PASSED PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source FIELD fails validation STANDARD_OUT 05:54:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify env var policy configuration for source FIELD fails validation 05:54:21 | ERROR | PolicyConfigurationTest | PolicyService | error creating new policy io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid error: error validating lifecycle stage error: policy configuration is invalid for deploy time: policy validation error: validation of section "" error: policy criteria "Environment Variable" has invalid value[0]="KEY=VALUE" must match regex "((?m)^(?i:(UNSET|RAW|UNKNOWN|^)=([^=]*)=.*)|((SECRET_KEY|CONFIG_MAP_KEY|FIELD|RESOURCE_FIELD)=([^=]*)=$)$)": invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.postPolicy(PolicyServiceGrpc.java:1022) [3 skipped] at services.PolicyService.createNewPolicy(PolicyService.groovy:31) [1 skipped] at PolicyConfigurationTest.$spock_feature_1_3(PolicyConfigurationTest.groovy:714) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:54:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source FIELD fails validation PASSED PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source RESOURCE_FIELD fails validation STANDARD_OUT 05:54:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify env var policy configuration for source RESOURCE_FIELD fails validation 05:54:21 | ERROR | PolicyConfigurationTest | PolicyService | error creating new policy io.grpc.StatusRuntimeException: INVALID_ARGUMENT: policy invalid error: error validating lifecycle stage error: policy configuration is invalid for deploy time: policy validation error: validation of section "" error: policy criteria "Environment Variable" has invalid value[0]="KEY=VALUE" must match regex "((?m)^(?i:(UNSET|RAW|UNKNOWN|^)=([^=]*)=.*)|((SECRET_KEY|CONFIG_MAP_KEY|FIELD|RESOURCE_FIELD)=([^=]*)=$)$)": invalid arguments at io.stackrox.proto.api.v1.PolicyServiceGrpc$PolicyServiceBlockingStub.postPolicy(PolicyServiceGrpc.java:1022) [3 skipped] at services.PolicyService.createNewPolicy(PolicyService.groovy:31) [1 skipped] at PolicyConfigurationTest.$spock_feature_1_3(PolicyConfigurationTest.groovy:714) [9 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:54:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify env var policy configuration for source #envVarSource fails validation > Verify env var policy configuration for source RESOURCE_FIELD fails validation PASSED PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: LabelScope STANDARD_OUT 05:54:21 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy scopes are triggered appropriately: LabelScope 05:54:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace label-scope-violation 05:54:21 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace label-scope-non-violation 05:54:21 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:25 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:25 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:54:25 | INFO | PolicyConfigurationTest | Services | Test Label Scope triggered after waiting 3 seconds 05:54:25 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:28 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:28 | INFO | PolicyConfigurationTest | Services | Failed to trigger Test Label Scope after waiting 3 seconds 05:54:28 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: label-scope-violation 05:54:28 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: label-scope-non-violation 05:54:28 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: LabelScope PASSED PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: NamespaceScope STANDARD_OUT 05:54:28 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy scopes are triggered appropriately: NamespaceScope 05:54:28 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace namespace-scope-violation 05:54:28 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace namespace-scope-non-violation 05:54:28 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:31 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:31 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:54:31 | INFO | PolicyConfigurationTest | Services | Test Namespace Scope triggered after waiting 3 seconds 05:54:31 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:34 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:34 | INFO | PolicyConfigurationTest | Services | Failed to trigger Test Namespace Scope after waiting 3 seconds 05:54:34 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: namespace-scope-violation 05:54:34 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: namespace-scope-non-violation 05:54:34 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: NamespaceScope PASSED PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: ClusterNamespaceLabelScope STANDARD_OUT 05:54:34 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy scopes are triggered appropriately: ClusterNamespaceLabelScope 05:54:34 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace all-scope-violation 05:54:34 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace all-scope-non-violation 05:54:34 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:37 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:37 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:54:37 | INFO | PolicyConfigurationTest | Services | Test All Scopes in One triggered after waiting 3 seconds 05:54:37 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:40 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:40 | INFO | PolicyConfigurationTest | Services | Failed to trigger Test All Scopes in One after waiting 3 seconds 05:54:41 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: all-scope-violation 05:54:41 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: all-scope-non-violation 05:54:41 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: ClusterNamespaceLabelScope PASSED PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: MultipleScopes STANDARD_OUT 05:54:41 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify policy scopes are triggered appropriately: MultipleScopes 05:54:41 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace multiple-scope-violation 05:54:41 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace multiple-scope-violation2 05:54:41 | DEBUG | PolicyConfigurationTest | Kubernetes | Told the orchestrator to createOrReplace multiple-scope-non-violation 05:54:41 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:44 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:44 | INFO | PolicyConfigurationTest | Services | violation size is: 2 05:54:44 | INFO | PolicyConfigurationTest | Services | Test Multiple Scopes triggered after waiting 3 seconds 05:54:44 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:44 | INFO | PolicyConfigurationTest | Services | violation size is: 1 05:54:44 | INFO | PolicyConfigurationTest | Services | Test Multiple Scopes triggered after waiting 0 seconds 05:54:44 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:47 | DEBUG | PolicyConfigurationTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:54:47 | INFO | PolicyConfigurationTest | Services | Failed to trigger Test Multiple Scopes after waiting 3 seconds 05:54:47 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: multiple-scope-violation 05:54:47 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: multiple-scope-violation2 05:54:47 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: multiple-scope-non-violation 05:54:47 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify policy scopes are triggered appropriately: #policyName > Verify policy scopes are triggered appropriately: MultipleScopes PASSED PolicyConfigurationTest > Verify dryRun on a disabled policy generates violations for matching deployments STANDARD_OUT 05:54:47 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Starting testcase: Verify dryRun on a disabled policy generates violations for matching deployments 05:54:52 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testcase PolicyConfigurationTest > Verify dryRun on a disabled policy generates violations for matching deployments PASSED PolicyConfigurationTest STANDARD_OUT 05:54:52 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: deploymentnginx 05:54:52 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: qadefpolstruts 05:54:52 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: qaapachedns 05:54:52 | DEBUG | PolicyConfigurationTest | Kubernetes | deploymentnginx-lb: Service deleting... 05:54:52 | DEBUG | PolicyConfigurationTest | Kubernetes | deploymentnginx-lb: Service deleted 05:54:52 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: deploymentnginx-lb 05:54:52 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: deploymentnginx-np 05:54:52 | DEBUG | PolicyConfigurationTest | Kubernetes | Removed the deployment: deployment-rbac 05:54:52 | DEBUG | PolicyConfigurationTest | Kubernetes | deploymentnginx-np: Service deleting... 05:54:52 | DEBUG | PolicyConfigurationTest | Kubernetes | deploymentnginx-np: Service deleted 05:54:52 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Ending testsuite 05:54:52 | INFO | PolicyConfigurationTest | PolicyConfigurationTest | Checking if cluster is healthy after test 05:54:52 | DEBUG | PolicyConfigurationTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ProcessVisualizationReplicaTest STANDARD_OUT 05:54:52 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Starting testsuite 05:54:52 | DEBUG | ProcessVisualizationRepli | OpenShift | Namespace qa already exists 05:54:52 | DEBUG | ProcessVisualizationRepli | Kubernetes | Told the orchestrator to createOrReplace apacheserverdeployment 05:54:52 | DEBUG | ProcessVisualizationRepli | OpenShift | Namespace qa already exists 05:54:52 | DEBUG | ProcessVisualizationRepli | Kubernetes | Told the orchestrator to createOrReplace mongodeployment 05:54:52 | DEBUG | ProcessVisualizationRepli | Kubernetes | Waiting for apacheserverdeployment to start 05:54:52 | DEBUG | ProcessVisualizationRepli | Kubernetes | Status of apacheserverdeployment's pods: 05:54:52 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-7bhrh Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:54:52 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-dfz2z Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:54:52 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-jdlgk Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:54:52 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-x2ql6 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:54:52 | DEBUG | ProcessVisualizationRepli | Kubernetes | 0/4 are in the ready state for apacheserverdeployment 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | Waiting for apacheserverdeployment to start 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | Status of apacheserverdeployment's pods: 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-7bhrh Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:54:53Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-dfz2z Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:54:53Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-jdlgk Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:54:53Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | - apacheserverdeployment-567f694d98-x2ql6 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:54:53Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | All 4 replicas found in ready state for apacheserverdeployment 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | Took 3 seconds for k8s deployment apacheserverdeployment 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | Updating deployment apacheserverdeployment with 4 pods 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | Waiting for mongodeployment to start 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | Status of mongodeployment's pods: 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | - mongodeployment-869849564b-ffq5t Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:54:53Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | - mongodeployment-869849564b-mkrpd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:54:53Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | - mongodeployment-869849564b-qbd26 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:54:53Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | - mongodeployment-869849564b-vtvfs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:54:53Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | All 4 replicas found in ready state for mongodeployment 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | Took 0 seconds for k8s deployment mongodeployment 05:54:55 | DEBUG | ProcessVisualizationRepli | Kubernetes | Updating deployment mongodeployment with 4 pods 05:54:55 | INFO | ProcessVisualizationRepli | Services | SR found deployment apacheserverdeployment within 0s 05:54:55 | INFO | ProcessVisualizationRepli | Services | SR found deployment mongodeployment within 0s ProcessVisualizationReplicaTest > Verify process visualization with replicas on #depName > Verify process visualization with replicas on apacheserverdeployment STANDARD_OUT 05:54:55 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Starting testcase: Verify process visualization with replicas on apacheserverdeployment 05:54:55 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:54:56 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:54:56 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Didn't find all the expected processes, retrying... 05:55:01 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:01 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:01 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Didn't find all the expected processes, retrying... 05:55:06 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:06 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:06 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Didn't find all the expected processes, retrying... 05:55:11 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:11 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:11 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Didn't find all the expected processes, retrying... 05:55:16 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:16 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:16 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Didn't find all the expected processes, retrying... 05:55:21 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:21 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:21 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Didn't find all the expected processes, retrying... 05:55:26 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:26 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:26 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | ProcessVisualizationTest: Dep: apacheserverdeployment Processes: [/usr/sbin/apache2, /usr/bin/tail, /bin/chown, /run.sh] 05:55:26 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:26 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | [/usr/bin/tail:[9640560050ab, 4cc45ea13b7a, c83ecd4b1b16, e840fb231c83], /bin/chown:[e840fb231c83, 9640560050ab, c83ecd4b1b16, 4cc45ea13b7a], /usr/sbin/apache2:[9640560050ab, c83ecd4b1b16, 4cc45ea13b7a, e840fb231c83], /run.sh:[9640560050ab, c83ecd4b1b16, 4cc45ea13b7a, e840fb231c83]] 05:55:26 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Ending testcase ProcessVisualizationReplicaTest > Verify process visualization with replicas on #depName > Verify process visualization with replicas on apacheserverdeployment PASSED ProcessVisualizationReplicaTest > Verify process visualization with replicas on #depName > Verify process visualization with replicas on mongodeployment STANDARD_OUT 05:55:26 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Starting testcase: Verify process visualization with replicas on mongodeployment 05:55:26 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:26 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:26 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | ProcessVisualizationTest: Dep: mongodeployment Processes: [/usr/bin/numactl, /usr/local/bin/gosu, /usr/local/bin/docker-entrypoint.sh, /bin/true, /bin/rm, /usr/bin/mongod, /usr/bin/id, /usr/bin/find, /bin/chown] 05:55:26 | DEBUG | ProcessVisualizationRepli | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:26 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | [/usr/bin/id:[b9b93c2bf4ad, 60457ce8254e, 5fca633bdc9d, 9be74f576dc9], /usr/local/bin/docker-entrypoint.sh:[60457ce8254e, 9be74f576dc9, b9b93c2bf4ad, 5fca633bdc9d], /usr/bin/numactl:[9be74f576dc9, 60457ce8254e, 9be74f576dc9, 5fca633bdc9d, b9b93c2bf4ad, 5fca633bdc9d, b9b93c2bf4ad, 60457ce8254e], /usr/bin/mongod:[9be74f576dc9, 60457ce8254e, b9b93c2bf4ad, 5fca633bdc9d]] 05:55:26 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Ending testcase ProcessVisualizationReplicaTest > Verify process visualization with replicas on #depName > Verify process visualization with replicas on mongodeployment PASSED ProcessVisualizationReplicaTest STANDARD_OUT 05:55:26 | DEBUG | ProcessVisualizationRepli | Kubernetes | Removed the deployment: apacheserverdeployment 05:55:26 | DEBUG | ProcessVisualizationRepli | Kubernetes | Removed the deployment: mongodeployment 05:55:26 | INFO | ProcessVisualizationRepli | Services | SR does not detect the deployment apacheserverdeployment yet: io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id '97a7ae88-3392-40f1-8422-67d755536c46' does not exist: not found 05:55:26 | INFO | ProcessVisualizationRepli | Services | SR does not detect the deployment mongodeployment yet: io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id 'e1b819ff-9965-42e9-a3e8-18295111a013' does not exist: not found 05:55:26 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Ending testsuite 05:55:26 | INFO | ProcessVisualizationRepli | ProcessVisualizationRepli | Checking if cluster is healthy after test 05:55:26 | DEBUG | ProcessVisualizationRepli | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries ProcessVisualizationTest STANDARD_OUT 05:55:26 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testsuite 05:55:26 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:55:26 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace qanginx 05:55:26 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:55:26 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace qastruts 05:55:26 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:55:26 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace centosdeployment 05:55:26 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:55:26 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace fedoradeployment 05:55:26 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:55:26 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace elasticdeployment 05:55:26 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:55:26 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace mongodeployment 05:55:26 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:55:26 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace rox4751deployment 05:55:26 | DEBUG | ProcessVisualizationTest | OpenShift | Namespace qa already exists 05:55:26 | DEBUG | ProcessVisualizationTest | Kubernetes | Told the orchestrator to createOrReplace rox4979deployment 05:55:26 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for qanginx to start 05:55:26 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of qanginx's pods: 05:55:27 | DEBUG | ProcessVisualizationTest | Kubernetes | - qanginx-77c6fcc994-h4jc2 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:55:27 | DEBUG | ProcessVisualizationTest | Kubernetes | 0/1 are in the ready state for qanginx 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for qanginx to start 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of qanginx's pods: 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | - qanginx-77c6fcc994-h4jc2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:55:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for qanginx 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 3 seconds for k8s deployment qanginx 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment qanginx with 1 pods 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for qastruts to start 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of qastruts's pods: 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | - qastruts-868b56784f-ft24l Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:55:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for qastruts 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment qastruts 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment qastruts with 1 pods 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for centosdeployment to start 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of centosdeployment's pods: 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | - centosdeployment-676fb6c7d9-zg7r2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:55:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for centosdeployment 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment centosdeployment 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment centosdeployment with 1 pods 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for fedoradeployment to start 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of fedoradeployment's pods: 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | - fedoradeployment-54d757d899-dph2z Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:55:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for fedoradeployment 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment fedoradeployment 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment fedoradeployment with 1 pods 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for elasticdeployment to start 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of elasticdeployment's pods: 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | - elasticdeployment-56564dc9cd-cxlf4 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:55:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for elasticdeployment 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment elasticdeployment 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment elasticdeployment with 1 pods 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for mongodeployment to start 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of mongodeployment's pods: 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | - mongodeployment-869849564b-2jnr6 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:55:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for mongodeployment 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment mongodeployment 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment mongodeployment with 1 pods 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for rox4751deployment to start 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of rox4751deployment's pods: 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | - rox4751deployment-6dd7655d78-jg764 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:55:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for rox4751deployment 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment rox4751deployment 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment rox4751deployment with 1 pods 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Waiting for rox4979deployment to start 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Status of rox4979deployment's pods: 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | - rox4979deployment-6b8659fbb-mddxv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:55:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | All 1 replicas found in ready state for rox4979deployment 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Took 0 seconds for k8s deployment rox4979deployment 05:55:30 | DEBUG | ProcessVisualizationTest | Kubernetes | Updating deployment rox4979deployment with 1 pods 05:55:30 | INFO | ProcessVisualizationTest | Services | SR found deployment qanginx within 0s 05:55:30 | INFO | ProcessVisualizationTest | Services | SR found deployment qastruts within 0s 05:55:30 | INFO | ProcessVisualizationTest | Services | SR found deployment centosdeployment within 0s 05:55:30 | INFO | ProcessVisualizationTest | Services | SR found deployment fedoradeployment within 0s 05:55:30 | INFO | ProcessVisualizationTest | Services | SR found deployment elasticdeployment within 0s 05:55:30 | INFO | ProcessVisualizationTest | Services | SR found deployment mongodeployment within 0s 05:55:30 | INFO | ProcessVisualizationTest | Services | SR found deployment rox4751deployment within 0s 05:55:30 | INFO | ProcessVisualizationTest | Services | SR found deployment rox4979deployment within 0s ProcessVisualizationTest > Verify process visualization on kube-proxy STANDARD_OUT 05:55:30 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on kube-proxy 05:55:30 | INFO | ProcessVisualizationTest | Helpers | Won't collect logs for: org.junit.AssumptionViolatedException: got: , expected: is 05:55:30 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on kube-proxy SKIPPED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: qanginx STANDARD_OUT 05:55:30 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: qanginx 05:55:30 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:30 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Didn't find all the expected processes, retrying... 05:55:35 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:35 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Didn't find all the expected processes, retrying... 05:55:40 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: qanginx Processes: [/usr/sbin/nginx] 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: qanginx PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: qastruts STANDARD_OUT 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: qastruts 05:55:40 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: qastruts Processes: [/usr/bin/bash, /usr/bin/uname, /usr/bin/dirname, /usr/local/tomcat/bin/catalina.sh, /opt/java/openjdk/bin/java] 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: qastruts PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: centosdeployment STANDARD_OUT 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: centosdeployment 05:55:40 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: centosdeployment Processes: [/bin/sh, /bin/sleep] 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: centosdeployment PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: fedoradeployment STANDARD_OUT 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: fedoradeployment 05:55:40 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: fedoradeployment Processes: [/bin/sh, /bin/sleep] 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: fedoradeployment PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: elasticdeployment STANDARD_OUT 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: elasticdeployment 05:55:40 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: elasticdeployment Processes: [/bin/java, /usr/bin/hostname, /usr/bin/sh, /usr/share/elasticsearch/bin/elasticsearch, /usr/bin/egrep, /usr/bin/cut, /usr/bin/tr, /usr/bin/grep, /sbin/ldconfig, /usr/bin/dirname] 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: elasticdeployment PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: mongodeployment STANDARD_OUT 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: mongodeployment 05:55:40 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: mongodeployment Processes: [/bin/rm, /bin/chown, /usr/bin/mongod, /usr/bin/numactl, /usr/bin/id, /usr/local/bin/docker-entrypoint.sh, /bin/true, /usr/bin/find, /usr/local/bin/gosu] 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: mongodeployment PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: rox4751deployment STANDARD_OUT 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: rox4751deployment 05:55:40 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: rox4751deployment Processes: [/usr/bin/date, /test/bin/exec.sh, /usr/bin/sleep] 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: rox4751deployment PASSED ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: rox4979deployment STANDARD_OUT 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process visualization on default: rox4979deployment 05:55:40 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: rox4979deployment Processes: [/qa/exec.sh, /bin/sleep] 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process visualization on default: #depName > Verify process visualization on default: rox4979deployment PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on qanginx STANDARD_OUT 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on qanginx 05:55:40 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: qanginx Processes and UIDs: [/usr/sbin/nginx:[[0, 0]]] 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on qanginx PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on qastruts STANDARD_OUT 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on qastruts 05:55:40 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: qastruts Processes and UIDs: [/usr/bin/bash:[[0, 0]], /usr/bin/uname:[[0, 0]], /usr/bin/dirname:[[0, 0]], /usr/local/tomcat/bin/catalina.sh:[[0, 0]], /opt/java/openjdk/bin/java:[[0, 0]]] 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on qastruts PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on centosdeployment STANDARD_OUT 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on centosdeployment 05:55:40 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: centosdeployment Processes and UIDs: [/bin/sh:[[0, 0]], /bin/sleep:[[0, 0]]] 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on centosdeployment PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on fedoradeployment STANDARD_OUT 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on fedoradeployment 05:55:40 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: fedoradeployment Processes and UIDs: [/bin/sh:[[0, 0]], /bin/sleep:[[0, 0]]] 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on fedoradeployment PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on elasticdeployment STANDARD_OUT 05:55:40 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on elasticdeployment 05:55:41 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: elasticdeployment Processes and UIDs: [/bin/java:[[1000, 1000]], /usr/bin/hostname:[[1000, 1000]], /usr/bin/sh:[[1000, 1000]], /usr/share/elasticsearch/bin/elasticsearch:[[1000, 1000]], /usr/bin/egrep:[[1000, 1000]], /usr/bin/cut:[[1000, 1000]], /usr/bin/tr:[[1000, 1000]], /usr/bin/grep:[[1000, 1000]], /sbin/ldconfig:[[1000, 1000]], /usr/bin/dirname:[[1000, 1000]]] 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on elasticdeployment PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on rox4751deployment STANDARD_OUT 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on rox4751deployment 05:55:41 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: rox4751deployment Processes and UIDs: [/usr/bin/date:[[0, 0]], /test/bin/exec.sh:[[0, 0]], /usr/bin/sleep:[[0, 0]]] 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on rox4751deployment PASSED ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on rox4979deployment STANDARD_OUT 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process paths, UIDs, and GIDs on rox4979deployment 05:55:41 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: rox4979deployment Processes and UIDs: [/qa/exec.sh:[[9001, 9000]], /bin/sleep:[[9001, 9000]]] 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process paths, UIDs, and GIDs on #depName > Verify process paths, UIDs, and GIDs on rox4979deployment PASSED ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on qanginx STANDARD_OUT 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process arguments on qanginx 05:55:41 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: qanginx Processes: [[/usr/sbin/nginx, -g daemon off;]] 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on qanginx PASSED ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on centosdeployment STANDARD_OUT 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process arguments on centosdeployment 05:55:41 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: centosdeployment Processes: [[/bin/sh, -c /bin/sleep 600], [/bin/sleep, --coreutils-prog-shebang=sleep /bin/sleep 600]] 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on centosdeployment PASSED ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on fedoradeployment STANDARD_OUT 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process arguments on fedoradeployment 05:55:41 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: fedoradeployment Processes: [[/bin/sh, -c /bin/sleep 600], [/bin/sleep, 600]] 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on fedoradeployment PASSED ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on elasticdeployment STANDARD_OUT 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Starting testcase: Verify process arguments on elasticdeployment 05:55:41 | DEBUG | ProcessVisualizationTest | Helpers | Calling services.ProcessService.getProcessesForDeployment with 3 retries 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | ProcessVisualizationTest: Dep: elasticdeployment Processes: [[/bin/java, -XX:+UseConcMarkSweepGC -XX:CMSInitiatingOccupancyFraction=75 -XX:+UseCMSInitiatingOccupancyOnly -XX:+AlwaysPreTouch -server -Xss1m -Djava.awt.headless=true -Dfile.encoding=UTF-8 -Djna.nosys=true -Djdk.io.permissionsUseCanonicalPath=true -Dio.netty.noUnsafe=true -Dio.netty.noKeySetOptimization=true -Dio.netty.recycler.maxCapacityPerThread=0 -Dlog4j.shutdownHookEnabled=false -Dlog4j2.disable.jmx=true -Dlog4j.skipJansi=true -XX:+HeapDumpOnOutOfMemoryError -XX:+UnlockExperimentalVMOptions -XX:+UseCGroupMemoryLimitForHeap -XX:MaxRAMFraction=2 -XX:InitialRAMFraction=2 -XX:MinRAMFraction=2 -Des.path.home=/usr/share/elasticsearch -cp /usr/share/elasticsearch/lib/* org.elasticsearch.bootstrap.Elasticsearch -Epath.conf=/etc/elasticsearch], [/usr/bin/hostname, ], [/usr/bin/sh, -c ${ES_HOME}/bin/elasticsearch -Epath.conf=${ES_CONF}], [/usr/share/elasticsearch/bin/elasticsearch, /usr/share/elasticsearch/bin/elasticsearch -Epath.conf=/etc/elasticsearch], [/usr/bin/egrep, /usr/bin/egrep -- (^-d |-d$| -d |--daemonize$|--daemonize )], [/usr/bin/cut, -d. -f1], [/usr/bin/tr, \n ], [/usr/bin/grep, project.name], [/sbin/ldconfig, -p], [/usr/bin/grep, -E -- (^-d |-d$| -d |--daemonize$|--daemonize )], [/bin/java, -cp /usr/share/elasticsearch/lib/* org.elasticsearch.tools.JavaVersionChecker], [/usr/bin/grep, ^- /etc/elasticsearch/jvm.options], [/usr/bin/dirname, /usr/share/elasticsearch/bin/elasticsearch]] 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testcase ProcessVisualizationTest > Verify process arguments on #depName > Verify process arguments on elasticdeployment PASSED ProcessVisualizationTest STANDARD_OUT 05:55:41 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: qanginx 05:55:41 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: qastruts 05:55:41 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: centosdeployment 05:55:41 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: fedoradeployment 05:55:41 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: elasticdeployment 05:55:41 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: mongodeployment 05:55:41 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: rox4751deployment 05:55:41 | DEBUG | ProcessVisualizationTest | Kubernetes | Removed the deployment: rox4979deployment 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Ending testsuite 05:55:41 | INFO | ProcessVisualizationTest | ProcessVisualizationTest | Checking if cluster is healthy after test 05:55:41 | DEBUG | ProcessVisualizationTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries RbacAuthTest STANDARD_OUT 05:55:41 | INFO | RbacAuthTest | RbacAuthTest | Starting testsuite RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [:] STANDARD_OUT 05:55:41 | INFO | RbacAuthTest | RbacAuthTest | Starting testcase: Verify RBAC with Role/Token combinations: [:] 05:55:41 | INFO | RbacAuthTest | RbacAuthTest | Created Role: name: "Automation Roleca817db7-90d2-4aac-8f31-d2cdf22ca8bc" permission_set_id: "38b7cf30-6218-4b55-9857-661db0132f13" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 05:55:41 | INFO | RbacAuthTest | RbacAuthTest | Testing read function for Cluster 05:55:41 | INFO | RbacAuthTest | RbacAuthTest | Testing write function for Cluster 05:55:41 | INFO | RbacAuthTest | RoleService | Deleted role: Automation Roleca817db7-90d2-4aac-8f31-d2cdf22ca8bc and permission set 05:55:41 | INFO | RbacAuthTest | RbacAuthTest | Ending testcase RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [:] PASSED RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:NO_ACCESS] STANDARD_OUT 05:55:41 | INFO | RbacAuthTest | RbacAuthTest | Starting testcase: Verify RBAC with Role/Token combinations: [Cluster:NO_ACCESS] 05:55:41 | INFO | RbacAuthTest | RbacAuthTest | Created Role: name: "Automation Role94f32654-313f-4131-83b6-062534efbf8d" permission_set_id: "20a67615-38a9-4b3f-9add-08bff7e992de" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 05:55:41 | INFO | RbacAuthTest | RbacAuthTest | Testing read function for Cluster 05:55:41 | INFO | RbacAuthTest | RbacAuthTest | Testing write function for Cluster 05:55:41 | INFO | RbacAuthTest | RoleService | Deleted role: Automation Role94f32654-313f-4131-83b6-062534efbf8d and permission set 05:55:41 | INFO | RbacAuthTest | RbacAuthTest | Ending testcase RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:NO_ACCESS] PASSED RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS] STANDARD_OUT 05:55:41 | INFO | RbacAuthTest | RbacAuthTest | Starting testcase: Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS] 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Created Role: name: "Automation Rolef06a276e-bae8-46dd-af36-37fef618978e" permission_set_id: "b0cdac48-79b3-49e9-868a-8b534920d7e4" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Testing read function for Cluster 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Testing write function for Cluster 05:55:42 | INFO | RbacAuthTest | RoleService | Deleted role: Automation Rolef06a276e-bae8-46dd-af36-37fef618978e and permission set 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Ending testcase RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS] PASSED RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_WRITE_ACCESS] STANDARD_OUT 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Starting testcase: Verify RBAC with Role/Token combinations: [Cluster:READ_WRITE_ACCESS] 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Created Role: name: "Automation Role8e5521eb-34b1-46de-92de-3743e2db3b8d" permission_set_id: "a2b59d76-8aea-489c-9f9d-ad5a2c7c757c" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Testing read function for Cluster 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Testing write function for Cluster 05:55:42 | INFO | RbacAuthTest | RoleService | Deleted role: Automation Role8e5521eb-34b1-46de-92de-3743e2db3b8d and permission set 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Ending testcase RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_WRITE_ACCESS] PASSED RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS, Deployment:READ_ACCESS, NetworkGraph:READ_ACCESS, NetworkPolicy:READ_ACCESS] STANDARD_OUT 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Starting testcase: Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS, Deployment:READ_ACCESS, NetworkGraph:READ_ACCESS, NetworkPolicy:READ_ACCESS] 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Created Role: name: "Automation Rolebdca8e4e-05e5-42f8-896b-e7e76861adf5" permission_set_id: "ff51e4bd-5e17-4bf2-9dd8-13524c127d2e" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Testing read function for NetworkPolicy 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Testing write function for NetworkPolicy 05:55:42 | INFO | RbacAuthTest | RoleService | Deleted role: Automation Rolebdca8e4e-05e5-42f8-896b-e7e76861adf5 and permission set 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Ending testcase RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS, Deployment:READ_ACCESS, NetworkGraph:READ_ACCESS, NetworkPolicy:READ_ACCESS] PASSED RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS, Deployment:READ_ACCESS, NetworkGraph:READ_ACCESS, NetworkPolicy:READ_WRITE_ACCESS] STANDARD_OUT 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Starting testcase: Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS, Deployment:READ_ACCESS, NetworkGraph:READ_ACCESS, NetworkPolicy:READ_WRITE_ACCESS] 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Created Role: name: "Automation Role41c28f23-d5ab-4a8e-9ba1-5b6b7692d7cb" permission_set_id: "52308286-2135-45f4-8db4-1f73fcb71984" access_scope_id: "ffffffff-ffff-fff4-f5ff-ffffffffffff" 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Testing read function for NetworkPolicy 05:55:42 | INFO | RbacAuthTest | RbacAuthTest | Testing write function for NetworkPolicy 05:55:43 | INFO | RbacAuthTest | RoleService | Deleted role: Automation Role41c28f23-d5ab-4a8e-9ba1-5b6b7692d7cb and permission set 05:55:43 | INFO | RbacAuthTest | RbacAuthTest | Ending testcase RbacAuthTest > Verify RBAC with Role/Token combinations: #resourceAccess > Verify RBAC with Role/Token combinations: [Cluster:READ_ACCESS, Deployment:READ_ACCESS, NetworkGraph:READ_ACCESS, NetworkPolicy:READ_WRITE_ACCESS] PASSED RbacAuthTest STANDARD_OUT 05:55:43 | INFO | RbacAuthTest | RbacAuthTest | Ending testsuite 05:55:43 | INFO | RbacAuthTest | RbacAuthTest | Checking if cluster is healthy after test 05:55:43 | DEBUG | RbacAuthTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries RetryTest > test STANDARD_OUT 05:55:43 | DEBUG | | Helpers | Calling RetryTest.fail with 3 retries 05:55:43 | DEBUG | | Helpers | Caught exception. Retrying in 0s (attempt 0 of 3): Condition not satisfied: i++ > 2 | | 0 false I was called 0 times 05:55:43 | DEBUG | | Helpers | Caught exception. Retrying in 0s (attempt 1 of 3): Condition not satisfied: i++ > 2 | | 1 false I was called 1 times 05:55:43 | DEBUG | | Helpers | Caught exception. Retrying in 0s (attempt 2 of 3): Condition not satisfied: i++ > 2 | | 2 false I was called 2 times RetryTest > test PASSED RiskTest STANDARD_OUT 05:55:43 | INFO | RiskTest | RiskTest | Starting testsuite 05:55:43 | INFO | RiskTest | OpenShift | Created namespace qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0 05:55:43 | INFO | RiskTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0 namespace. 05:55:43 | DEBUG | RiskTest | Kubernetes | quay: secret created. 05:55:43 | DEBUG | RiskTest | Kubernetes | default-dockercfg-tkj7v: secret created. 05:55:43 | DEBUG | RiskTest | Kubernetes | redhat-image-pull-secret: secret created. 05:55:43 | DEBUG | RiskTest | Kubernetes | public-dockerhub: secret created. 05:55:43 | DEBUG | RiskTest | Kubernetes | gcr-image-pull-secret: secret created. 05:55:43 | DEBUG | RiskTest | OpenShift | Adding system:serviceaccount:qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0:default to anyuid user list 05:55:43 | DEBUG | RiskTest | Kubernetes | Told the orchestrator to createOrReplace risk-deployment-1 05:55:43 | DEBUG | RiskTest | OpenShift | Namespace qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0 already exists 05:55:43 | DEBUG | RiskTest | Kubernetes | Told the orchestrator to createOrReplace risk-deployment-0 05:55:43 | DEBUG | RiskTest | Kubernetes | Waiting for risk-deployment-1 to start 05:55:43 | DEBUG | RiskTest | Kubernetes | Status of risk-deployment-1's pods: 05:55:43 | DEBUG | RiskTest | Kubernetes | - risk-deployment-1-57d9df85d8-2zpxd Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:55:43 | DEBUG | RiskTest | Kubernetes | 0/1 are in the ready state for risk-deployment-1 05:55:46 | DEBUG | RiskTest | Kubernetes | Waiting for risk-deployment-1 to start 05:55:47 | DEBUG | RiskTest | Kubernetes | Status of risk-deployment-1's pods: 05:55:47 | DEBUG | RiskTest | Kubernetes | - risk-deployment-1-57d9df85d8-2zpxd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:55:44Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:55:47 | DEBUG | RiskTest | Kubernetes | All 1 replicas found in ready state for risk-deployment-1 05:55:47 | DEBUG | RiskTest | Kubernetes | Took 3 seconds for k8s deployment risk-deployment-1 05:55:47 | DEBUG | RiskTest | Kubernetes | Updating deployment risk-deployment-1 with 1 pods 05:55:47 | DEBUG | RiskTest | Kubernetes | Waiting for risk-deployment-0 to start 05:55:47 | DEBUG | RiskTest | Kubernetes | Status of risk-deployment-0's pods: 05:55:47 | DEBUG | RiskTest | Kubernetes | - risk-deployment-0-85bcff45bb-qcdgn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:55:44Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:55:47 | DEBUG | RiskTest | Kubernetes | All 1 replicas found in ready state for risk-deployment-0 05:55:47 | DEBUG | RiskTest | Kubernetes | Took 0 seconds for k8s deployment risk-deployment-0 05:55:47 | DEBUG | RiskTest | Kubernetes | Updating deployment risk-deployment-0 with 1 pods 05:55:47 | INFO | RiskTest | Services | SR found deployment risk-deployment-1 within 0s 05:55:47 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, c9607c06-74c7-49ad-b48d-d92fef33dc62, null within 0s 05:55:47 | INFO | RiskTest | RiskTest | Processes for risk-deployment-1: 05:55:47 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-11-27T05:56:47.105756046Z 05:55:47 | INFO | RiskTest | RiskTest | User lock at none 05:55:47 | INFO | RiskTest | Services | SR found deployment risk-deployment-0 within 0s 05:55:47 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, 30c54339-1486-4209-ae1e-401c37b7e5dc, null within 0s 05:55:47 | INFO | RiskTest | RiskTest | Processes for risk-deployment-0: /bin/sh,/bin/sleep 05:55:47 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-11-27T05:56:47.151811361Z 05:55:47 | INFO | RiskTest | RiskTest | User lock at none RiskTest > Deployment count == 2 STANDARD_OUT 05:55:47 | INFO | RiskTest | RiskTest | Starting testcase: Deployment count == 2 05:55:47 | INFO | RiskTest | RiskTest | Ending testcase RiskTest > Deployment count == 2 PASSED RiskTest > Risk is the same for equivalent deployments STANDARD_OUT 05:55:47 | INFO | RiskTest | RiskTest | Starting testcase: Risk is the same for equivalent deployments 05:55:47 | INFO | RiskTest | RiskTest | not yet ready to test - container summary status are not set 05:55:52 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, c9607c06-74c7-49ad-b48d-d92fef33dc62, null within 0s 05:55:52 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found for risk-deployment-1 05:55:52 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, 30c54339-1486-4209-ae1e-401c37b7e5dc, null within 0s 05:55:52 | INFO | RiskTest | RiskTest | SR found /bin/sh for risk-deployment-0 05:55:52 | INFO | RiskTest | RiskTest | SR found /bin/sleep for risk-deployment-0 05:55:52 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found 05:55:57 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, c9607c06-74c7-49ad-b48d-d92fef33dc62, null within 0s 05:55:57 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found for risk-deployment-1 05:55:57 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, 30c54339-1486-4209-ae1e-401c37b7e5dc, null within 0s 05:55:57 | INFO | RiskTest | RiskTest | SR found /bin/sh for risk-deployment-0 05:55:57 | INFO | RiskTest | RiskTest | SR found /bin/sleep for risk-deployment-0 05:55:57 | INFO | RiskTest | RiskTest | not yet ready to test - processes not found 05:56:02 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, c9607c06-74c7-49ad-b48d-d92fef33dc62, null within 0s 05:56:02 | INFO | RiskTest | RiskTest | SR found /bin/sleep for risk-deployment-1 05:56:02 | INFO | RiskTest | RiskTest | SR found /bin/sh for risk-deployment-1 05:56:02 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, 30c54339-1486-4209-ae1e-401c37b7e5dc, null within 0s 05:56:02 | INFO | RiskTest | RiskTest | SR found /bin/sh for risk-deployment-0 05:56:02 | INFO | RiskTest | RiskTest | SR found /bin/sleep for risk-deployment-0 05:56:02 | INFO | RiskTest | RiskTest | ready to test 05:56:02 | INFO | RiskTest | RiskTest | risk-deployment-0 priority 4, anomalous false, status UNLOCKED 05:56:02 | INFO | RiskTest | RiskTest | risk-deployment-1 priority 4, anomalous false, status UNLOCKED 05:56:02 | INFO | RiskTest | RiskTest | Ending testcase RiskTest > Risk is the same for equivalent deployments PASSED RiskTest > Processes grouped by deployment (GetGroupedProcessByDeploymentAndContainer) SKIPPED RiskTest > Risk priority changes when a process is executed after the discovery phase STANDARD_OUT 05:56:02 | INFO | RiskTest | RiskTest | Starting testcase: Risk priority changes when a process is executed after the discovery phase 05:56:02 | INFO | RiskTest | RiskTest | sleeping for 60 seconds to ensure the discovery phase is over 05:57:02 | DEBUG | RiskTest | Kubernetes | First container in pod risk-deployment-1-57d9df85d8-2zpxd is running 05:57:02 | DEBUG | RiskTest | Kubernetes | Exec-ing the following command in pod risk-deployment-1-57d9df85d8-2zpxd: [ls] 05:57:02 | DEBUG | | Kubernetes | Command exited with 0 05:57:02 | DEBUG | | Kubernetes | Websocket response: 1000 null 05:57:02 | DEBUG | RiskTest | Kubernetes | Command status: SUCCESS Stdout: bin boot dev etc home lib lib64 media mnt opt proc root run sbin srv sys tmp usr var Stderr: 05:57:02 | INFO | RiskTest | RiskTest | Before: 05:57:02 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status UNLOCKED 05:57:02 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 4, anomalous false, status UNLOCKED 05:57:02 | INFO | RiskTest | RiskTest | After: 05:57:02 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status UNLOCKED 05:57:02 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 4, anomalous false, status UNLOCKED 05:57:02 | INFO | RiskTest | RiskTest | Process List: 05:57:02 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:02 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/sh, /bin/sleep 05:57:02 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:02 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:57:02 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, 30c54339-1486-4209-ae1e-401c37b7e5dc, null within 0s 05:57:02 | INFO | RiskTest | RiskTest | Processes for risk-deployment-0: /bin/sh,/bin/sleep 05:57:02 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-11-27T05:56:47.151811361Z 05:57:02 | INFO | RiskTest | RiskTest | User lock at none 05:57:02 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, c9607c06-74c7-49ad-b48d-d92fef33dc62, null within 0s 05:57:02 | INFO | RiskTest | RiskTest | Processes for risk-deployment-1: /bin/sleep,/bin/sh 05:57:02 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-11-27T05:56:47.105756046Z 05:57:02 | INFO | RiskTest | RiskTest | User lock at none 05:57:02 | INFO | RiskTest | RiskTest | not yet ready to test - there is no change yet to priorities 05:57:07 | INFO | RiskTest | RiskTest | Before: 05:57:07 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status UNLOCKED 05:57:07 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 4, anomalous false, status UNLOCKED 05:57:07 | INFO | RiskTest | RiskTest | After: 05:57:07 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status LOCKED 05:57:07 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status UNLOCKED 05:57:07 | INFO | RiskTest | RiskTest | Process List: 05:57:07 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:07 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/sh, /bin/sleep 05:57:07 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:07 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:57:08 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, 30c54339-1486-4209-ae1e-401c37b7e5dc, null within 0s 05:57:08 | INFO | RiskTest | RiskTest | Processes for risk-deployment-0: /bin/sh,/bin/sleep 05:57:08 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-11-27T05:56:47.151811361Z 05:57:08 | INFO | RiskTest | RiskTest | User lock at none 05:57:08 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, c9607c06-74c7-49ad-b48d-d92fef33dc62, null within 0s 05:57:08 | INFO | RiskTest | RiskTest | Processes for risk-deployment-1: /bin/sleep,/bin/sh 05:57:08 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-11-27T05:56:47.105756046Z 05:57:08 | INFO | RiskTest | RiskTest | User lock at none 05:57:08 | INFO | RiskTest | RiskTest | not yet ready to test - there is no anomalous process spotted yet 05:57:13 | INFO | RiskTest | RiskTest | Before: 05:57:13 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status UNLOCKED 05:57:13 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 4, anomalous false, status UNLOCKED 05:57:13 | INFO | RiskTest | RiskTest | After: 05:57:13 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status LOCKED 05:57:13 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status UNLOCKED 05:57:13 | INFO | RiskTest | RiskTest | Process List: 05:57:13 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:13 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/sh, /bin/sleep 05:57:13 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:13 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:57:13 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, 30c54339-1486-4209-ae1e-401c37b7e5dc, null within 0s 05:57:13 | INFO | RiskTest | RiskTest | Processes for risk-deployment-0: /bin/sh,/bin/sleep 05:57:13 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-11-27T05:56:47.151811361Z 05:57:13 | INFO | RiskTest | RiskTest | User lock at none 05:57:13 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, c9607c06-74c7-49ad-b48d-d92fef33dc62, null within 0s 05:57:13 | INFO | RiskTest | RiskTest | Processes for risk-deployment-1: /bin/sleep,/bin/sh 05:57:13 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-11-27T05:56:47.105756046Z 05:57:13 | INFO | RiskTest | RiskTest | User lock at none 05:57:13 | INFO | RiskTest | RiskTest | not yet ready to test - there is no anomalous process spotted yet 05:57:18 | INFO | RiskTest | RiskTest | Before: 05:57:18 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status UNLOCKED 05:57:18 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 4, anomalous false, status UNLOCKED 05:57:18 | INFO | RiskTest | RiskTest | After: 05:57:18 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status LOCKED 05:57:18 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status UNLOCKED 05:57:18 | INFO | RiskTest | RiskTest | Process List: 05:57:18 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:18 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/sh, /bin/sleep 05:57:18 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:18 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:57:18 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, 30c54339-1486-4209-ae1e-401c37b7e5dc, null within 0s 05:57:18 | INFO | RiskTest | RiskTest | Processes for risk-deployment-0: /bin/sh,/bin/sleep 05:57:18 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-11-27T05:56:47.151811361Z 05:57:18 | INFO | RiskTest | RiskTest | User lock at none 05:57:18 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, c9607c06-74c7-49ad-b48d-d92fef33dc62, null within 0s 05:57:18 | INFO | RiskTest | RiskTest | Processes for risk-deployment-1: /bin/sleep,/bin/sh 05:57:18 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-11-27T05:56:47.105756046Z 05:57:18 | INFO | RiskTest | RiskTest | User lock at none 05:57:18 | INFO | RiskTest | RiskTest | not yet ready to test - there is no anomalous process spotted yet 05:57:23 | INFO | RiskTest | RiskTest | Before: 05:57:23 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status UNLOCKED 05:57:23 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 4, anomalous false, status UNLOCKED 05:57:23 | INFO | RiskTest | RiskTest | After: 05:57:23 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:57:23 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status UNLOCKED 05:57:23 | INFO | RiskTest | RiskTest | Process List: 05:57:23 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:23 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/ls, /bin/sh, /bin/sleep 05:57:23 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:23 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:57:23 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, 30c54339-1486-4209-ae1e-401c37b7e5dc, null within 0s 05:57:23 | INFO | RiskTest | RiskTest | Processes for risk-deployment-0: /bin/sh,/bin/sleep 05:57:23 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-11-27T05:56:47.151811361Z 05:57:23 | INFO | RiskTest | RiskTest | User lock at none 05:57:23 | INFO | RiskTest | ProcessBaselineService | SR found process in baseline for the key - 669e82d1-a7cf-43f8-a6b4-48c7fd9f6101, qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0, c9607c06-74c7-49ad-b48d-d92fef33dc62, null within 0s 05:57:23 | INFO | RiskTest | RiskTest | Processes for risk-deployment-1: /bin/sleep,/bin/sh 05:57:23 | INFO | RiskTest | RiskTest | Stackrox lock at 2025-11-27T05:56:47.105756046Z 05:57:23 | INFO | RiskTest | RiskTest | User lock at none 05:57:23 | INFO | RiskTest | RiskTest | ready to test 05:57:23 | INFO | RiskTest | RiskTest | Ending testcase RiskTest > Risk priority changes when a process is executed after the discovery phase PASSED RiskTest > Risk changes when an anomalous process is added to the baseline STANDARD_OUT 05:57:23 | INFO | RiskTest | RiskTest | Starting testcase: Risk changes when an anomalous process is added to the baseline 05:57:23 | INFO | RiskTest | RiskTest | the process baseline is updated 05:57:23 | INFO | RiskTest | RiskTest | Before: 05:57:23 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:57:23 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status UNLOCKED 05:57:23 | INFO | RiskTest | RiskTest | After: 05:57:23 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:57:23 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status UNLOCKED 05:57:23 | INFO | RiskTest | RiskTest | Process List: 05:57:23 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:23 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/ls, /bin/sh, /bin/sleep 05:57:23 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:23 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:57:23 | INFO | RiskTest | RiskTest | not yet ready to test - there is no change yet to risk score 05:57:28 | INFO | RiskTest | RiskTest | Before: 05:57:28 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:57:28 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status UNLOCKED 05:57:28 | INFO | RiskTest | RiskTest | After: 05:57:28 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:57:28 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status UNLOCKED 05:57:28 | INFO | RiskTest | RiskTest | Process List: 05:57:28 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:28 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/ls, /bin/sh, /bin/sleep 05:57:28 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:28 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:57:28 | INFO | RiskTest | RiskTest | not yet ready to test - there is no change yet to risk score 05:57:33 | INFO | RiskTest | RiskTest | Before: 05:57:33 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:57:33 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status UNLOCKED 05:57:33 | INFO | RiskTest | RiskTest | After: 05:57:33 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:57:33 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status UNLOCKED 05:57:33 | INFO | RiskTest | RiskTest | Process List: 05:57:33 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:33 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/ls, /bin/sh, /bin/sleep 05:57:33 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:33 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:57:33 | INFO | RiskTest | RiskTest | not yet ready to test - there is no change yet to risk score 05:57:38 | INFO | RiskTest | RiskTest | Before: 05:57:38 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 2, anomalous true, status LOCKED 05:57:38 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status UNLOCKED 05:57:38 | INFO | RiskTest | RiskTest | After: 05:57:38 | INFO | RiskTest | RiskTest | Deployment with risk: risk-deployment-1 priority 4, anomalous false, status LOCKED 05:57:38 | INFO | RiskTest | RiskTest | Deployment without risk: risk-deployment-0 priority 5, anomalous false, status UNLOCKED 05:57:38 | INFO | RiskTest | RiskTest | Process List: 05:57:38 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:38 | INFO | RiskTest | RiskTest | Deployment with risk: /bin/ls, /bin/sh, /bin/sleep 05:57:38 | DEBUG | RiskTest | Helpers | Calling services.ProcessService.getGroupedProcessByDeploymentAndContainer with 3 retries 05:57:38 | INFO | RiskTest | RiskTest | Deployment without risk: /bin/sh, /bin/sleep 05:57:38 | INFO | RiskTest | RiskTest | ready to test 05:57:38 | INFO | RiskTest | RiskTest | Ending testcase RiskTest > Risk changes when an anomalous process is added to the baseline PASSED RiskTest STANDARD_OUT 05:57:38 | DEBUG | RiskTest | Kubernetes | Removed the deployment: risk-deployment-1 05:57:38 | DEBUG | RiskTest | Kubernetes | risk-deployment-1: deployment removed. 05:57:38 | DEBUG | RiskTest | Kubernetes | Removed the deployment: risk-deployment-0 05:57:38 | DEBUG | RiskTest | Kubernetes | risk-deployment-0: deployment removed. 05:57:38 | DEBUG | RiskTest | Kubernetes | Waiting for namespace qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0 to be deleted 05:57:38 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:57:41 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:57:44 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:57:47 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:57:50 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:57:53 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:57:56 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:57:59 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:58:02 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:58:05 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:58:08 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:58:11 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:58:15 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:58:18 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:58:21 | DEBUG | RiskTest | Kubernetes | Retrying in 3... 05:58:24 | DEBUG | RiskTest | Kubernetes | K8s found that namespace qa-risk-c5017e92-03c2-42a9-9699-0c256701e8b0 was deleted 05:58:24 | INFO | RiskTest | RiskTest | Ending testsuite 05:58:24 | INFO | RiskTest | RiskTest | Checking if cluster is healthy after test 05:58:24 | DEBUG | RiskTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries RoutesTest STANDARD_OUT 05:58:24 | INFO | RoutesTest | RoutesTest | Starting testsuite RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-auto-exposure-cluster-ip, autoExposeAsService: true, exposeAsService: true, loadBalancer: false, #0] STANDARD_OUT 05:58:24 | INFO | RoutesTest | RoutesTest | Starting testcase: Verify that routes are detected correctly [deploymentName: server-auto-exposure-cluster-ip, autoExposeAsService: true, exposeAsService: true, loadBalancer: false, #0] 05:58:24 | DEBUG | RoutesTest | OpenShift | Namespace qa already exists 05:58:24 | DEBUG | RoutesTest | Kubernetes | server-auto-exposure-cluster-ip service created 05:58:24 | DEBUG | RoutesTest | Kubernetes | Told the orchestrator to createOrReplace server-auto-exposure-cluster-ip 05:58:24 | DEBUG | RoutesTest | Kubernetes | Waiting for server-auto-exposure-cluster-ip to start 05:58:24 | DEBUG | RoutesTest | Kubernetes | Status of server-auto-exposure-cluster-ip's pods: 05:58:24 | DEBUG | RoutesTest | Kubernetes | - server-auto-exposure-cluster-ip-987b698bc-zbjpv Container status: [] 05:58:24 | DEBUG | RoutesTest | Kubernetes | 0/1 are in the ready state for server-auto-exposure-cluster-ip 05:58:27 | DEBUG | RoutesTest | Kubernetes | Waiting for server-auto-exposure-cluster-ip to start 05:58:27 | DEBUG | RoutesTest | Kubernetes | Status of server-auto-exposure-cluster-ip's pods: 05:58:27 | DEBUG | RoutesTest | Kubernetes | - server-auto-exposure-cluster-ip-987b698bc-zbjpv Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:58:25Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:58:27 | DEBUG | RoutesTest | Kubernetes | All 1 replicas found in ready state for server-auto-exposure-cluster-ip 05:58:27 | DEBUG | RoutesTest | Kubernetes | Took 3 seconds for k8s deployment server-auto-exposure-cluster-ip 05:58:27 | DEBUG | RoutesTest | Kubernetes | Updating deployment server-auto-exposure-cluster-ip with 1 pods 05:58:27 | DEBUG | RoutesTest | OpenShift | Creating a route: server-auto-exposure-cluster-ip 05:58:27 | DEBUG | RoutesTest | OpenShift | Deleting a route: server-auto-exposure-cluster-ip 05:58:27 | DEBUG | RoutesTest | Kubernetes | server-auto-exposure-cluster-ip: Service deleting... 05:58:27 | DEBUG | RoutesTest | Kubernetes | server-auto-exposure-cluster-ip: Service deleted 05:58:27 | DEBUG | RoutesTest | Kubernetes | Removed the deployment: server-auto-exposure-cluster-ip 05:58:27 | INFO | RoutesTest | RoutesTest | Ending testcase RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-auto-exposure-cluster-ip, autoExposeAsService: true, exposeAsService: true, loadBalancer: false, #0] PASSED RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-auto-exposure-lb, autoExposeAsService: true, exposeAsService: true, loadBalancer: true, #1] STANDARD_OUT 05:58:27 | INFO | RoutesTest | RoutesTest | Starting testcase: Verify that routes are detected correctly [deploymentName: server-auto-exposure-lb, autoExposeAsService: true, exposeAsService: true, loadBalancer: true, #1] 05:58:27 | DEBUG | RoutesTest | OpenShift | Namespace qa already exists 05:58:27 | DEBUG | RoutesTest | Kubernetes | server-auto-exposure-lb service created 05:58:27 | DEBUG | RoutesTest | Kubernetes | Waiting for LB external IP for server-auto-exposure-lb 05:58:31 | DEBUG | RoutesTest | Kubernetes | LB IP: ac486dda1b1224e1bb98cbe56ed0ab46-931361522.XXXXXXXXX.elb.amazonaws.com 05:58:31 | DEBUG | RoutesTest | Kubernetes | Told the orchestrator to createOrReplace server-auto-exposure-lb 05:58:31 | DEBUG | RoutesTest | Kubernetes | Waiting for LB external IP for server-auto-exposure-lb 05:58:31 | DEBUG | RoutesTest | Kubernetes | LB IP: ac486dda1b1224e1bb98cbe56ed0ab46-931361522.XXXXXXXXX.elb.amazonaws.com 05:58:31 | DEBUG | RoutesTest | Kubernetes | Waiting for server-auto-exposure-lb to start 05:58:31 | DEBUG | RoutesTest | Kubernetes | Status of server-auto-exposure-lb's pods: 05:58:31 | DEBUG | RoutesTest | Kubernetes | - server-auto-exposure-lb-6579dbc465-rrpd7 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:58:31 | DEBUG | RoutesTest | Kubernetes | 0/1 are in the ready state for server-auto-exposure-lb 05:58:34 | DEBUG | RoutesTest | Kubernetes | Waiting for server-auto-exposure-lb to start 05:58:34 | DEBUG | RoutesTest | Kubernetes | Status of server-auto-exposure-lb's pods: 05:58:34 | DEBUG | RoutesTest | Kubernetes | - server-auto-exposure-lb-6579dbc465-rrpd7 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:58:32Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:58:34 | DEBUG | RoutesTest | Kubernetes | All 1 replicas found in ready state for server-auto-exposure-lb 05:58:34 | DEBUG | RoutesTest | Kubernetes | Took 3 seconds for k8s deployment server-auto-exposure-lb 05:58:34 | DEBUG | RoutesTest | Kubernetes | Updating deployment server-auto-exposure-lb with 1 pods 05:58:34 | DEBUG | RoutesTest | OpenShift | Creating a route: server-auto-exposure-lb 05:58:34 | DEBUG | RoutesTest | OpenShift | Deleting a route: server-auto-exposure-lb 05:58:34 | DEBUG | RoutesTest | Kubernetes | server-auto-exposure-lb: Service deleting... 05:58:34 | DEBUG | RoutesTest | Kubernetes | server-auto-exposure-lb: Service deleted 05:58:34 | DEBUG | RoutesTest | Kubernetes | Removed the deployment: server-auto-exposure-lb 05:58:34 | INFO | RoutesTest | RoutesTest | Ending testcase RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-auto-exposure-lb, autoExposeAsService: true, exposeAsService: true, loadBalancer: true, #1] PASSED RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-exposure-cluster-ip, autoExposeAsService: false, exposeAsService: true, loadBalancer: false, #2] STANDARD_OUT 05:58:34 | INFO | RoutesTest | RoutesTest | Starting testcase: Verify that routes are detected correctly [deploymentName: server-exposure-cluster-ip, autoExposeAsService: false, exposeAsService: true, loadBalancer: false, #2] 05:58:34 | DEBUG | RoutesTest | OpenShift | Namespace qa already exists 05:58:35 | DEBUG | RoutesTest | Kubernetes | Told the orchestrator to createOrReplace server-exposure-cluster-ip 05:58:35 | DEBUG | RoutesTest | Kubernetes | Waiting for server-exposure-cluster-ip to start 05:58:35 | DEBUG | RoutesTest | Kubernetes | Status of server-exposure-cluster-ip's pods: 05:58:35 | DEBUG | RoutesTest | Kubernetes | - server-exposure-cluster-ip-6d89b9f757-bt6h2 Container status: [] 05:58:35 | DEBUG | RoutesTest | Kubernetes | 0/1 are in the ready state for server-exposure-cluster-ip 05:58:38 | DEBUG | RoutesTest | Kubernetes | Waiting for server-exposure-cluster-ip to start 05:58:38 | DEBUG | RoutesTest | Kubernetes | Status of server-exposure-cluster-ip's pods: 05:58:38 | DEBUG | RoutesTest | Kubernetes | - server-exposure-cluster-ip-6d89b9f757-bt6h2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:58:35Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:58:38 | DEBUG | RoutesTest | Kubernetes | All 1 replicas found in ready state for server-exposure-cluster-ip 05:58:38 | DEBUG | RoutesTest | Kubernetes | Took 3 seconds for k8s deployment server-exposure-cluster-ip 05:58:38 | DEBUG | RoutesTest | Kubernetes | Updating deployment server-exposure-cluster-ip with 1 pods 05:58:38 | DEBUG | RoutesTest | Kubernetes | server-exposure-cluster-ip service created 05:58:38 | DEBUG | RoutesTest | OpenShift | Creating a route: server-exposure-cluster-ip 05:58:38 | DEBUG | RoutesTest | Kubernetes | server-exposure-cluster-ip: Service deleting... 05:58:38 | DEBUG | RoutesTest | Kubernetes | server-exposure-cluster-ip: Service deleted 05:58:38 | DEBUG | RoutesTest | OpenShift | Deleting a route: server-exposure-cluster-ip 05:58:38 | DEBUG | RoutesTest | Kubernetes | Removed the deployment: server-exposure-cluster-ip 05:58:38 | INFO | RoutesTest | RoutesTest | Ending testcase RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-exposure-cluster-ip, autoExposeAsService: false, exposeAsService: true, loadBalancer: false, #2] PASSED RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-exposure-lb, autoExposeAsService: false, exposeAsService: true, loadBalancer: true, #3] STANDARD_OUT 05:58:38 | INFO | RoutesTest | RoutesTest | Starting testcase: Verify that routes are detected correctly [deploymentName: server-exposure-lb, autoExposeAsService: false, exposeAsService: true, loadBalancer: true, #3] 05:58:38 | DEBUG | RoutesTest | OpenShift | Namespace qa already exists 05:58:38 | DEBUG | RoutesTest | Kubernetes | Told the orchestrator to createOrReplace server-exposure-lb 05:58:38 | DEBUG | RoutesTest | Kubernetes | Waiting for server-exposure-lb to start 05:58:38 | DEBUG | RoutesTest | Kubernetes | Status of server-exposure-lb's pods: 05:58:38 | DEBUG | RoutesTest | Kubernetes | - server-exposure-lb-8459647fb7-4b7b4 Container status: [] 05:58:38 | DEBUG | RoutesTest | Kubernetes | 0/1 are in the ready state for server-exposure-lb 05:58:41 | DEBUG | RoutesTest | Kubernetes | Waiting for server-exposure-lb to start 05:58:41 | DEBUG | RoutesTest | Kubernetes | Status of server-exposure-lb's pods: 05:58:41 | DEBUG | RoutesTest | Kubernetes | - server-exposure-lb-8459647fb7-4b7b4 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:58:39Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:58:41 | DEBUG | RoutesTest | Kubernetes | All 1 replicas found in ready state for server-exposure-lb 05:58:41 | DEBUG | RoutesTest | Kubernetes | Took 3 seconds for k8s deployment server-exposure-lb 05:58:41 | DEBUG | RoutesTest | Kubernetes | Updating deployment server-exposure-lb with 1 pods 05:58:41 | DEBUG | RoutesTest | Kubernetes | server-exposure-lb service created 05:58:41 | DEBUG | RoutesTest | OpenShift | Creating a route: server-exposure-lb 05:58:41 | DEBUG | RoutesTest | Kubernetes | server-exposure-lb: Service deleting... 05:58:41 | DEBUG | RoutesTest | Kubernetes | server-exposure-lb: Service deleted 05:58:41 | DEBUG | RoutesTest | OpenShift | Deleting a route: server-exposure-lb 05:58:41 | DEBUG | RoutesTest | Kubernetes | Removed the deployment: server-exposure-lb 05:58:41 | INFO | RoutesTest | RoutesTest | Ending testcase RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-exposure-lb, autoExposeAsService: false, exposeAsService: true, loadBalancer: true, #3] PASSED RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-no-exposure, autoExposeAsService: false, exposeAsService: false, loadBalancer: false, #4] STANDARD_OUT 05:58:41 | INFO | RoutesTest | RoutesTest | Starting testcase: Verify that routes are detected correctly [deploymentName: server-no-exposure, autoExposeAsService: false, exposeAsService: false, loadBalancer: false, #4] 05:58:41 | DEBUG | RoutesTest | OpenShift | Namespace qa already exists 05:58:41 | DEBUG | RoutesTest | Kubernetes | Told the orchestrator to createOrReplace server-no-exposure 05:58:41 | DEBUG | RoutesTest | Kubernetes | Waiting for server-no-exposure to start 05:58:41 | DEBUG | RoutesTest | Kubernetes | Status of server-no-exposure's pods: 05:58:41 | DEBUG | RoutesTest | Kubernetes | - server-no-exposure-9586bd5d6-wfxv2 Container status: [] 05:58:41 | DEBUG | RoutesTest | Kubernetes | 0/1 are in the ready state for server-no-exposure 05:58:44 | DEBUG | RoutesTest | Kubernetes | Waiting for server-no-exposure to start 05:58:44 | DEBUG | RoutesTest | Kubernetes | Status of server-no-exposure's pods: 05:58:44 | DEBUG | RoutesTest | Kubernetes | - server-no-exposure-9586bd5d6-wfxv2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:58:42Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:58:44 | DEBUG | RoutesTest | Kubernetes | All 1 replicas found in ready state for server-no-exposure 05:58:44 | DEBUG | RoutesTest | Kubernetes | Took 3 seconds for k8s deployment server-no-exposure 05:58:44 | DEBUG | RoutesTest | Kubernetes | Updating deployment server-no-exposure with 1 pods 05:58:44 | DEBUG | RoutesTest | OpenShift | Creating a route: server-no-exposure 05:58:44 | DEBUG | RoutesTest | OpenShift | Deleting a route: server-no-exposure 05:58:44 | DEBUG | RoutesTest | Kubernetes | Removed the deployment: server-no-exposure 05:58:44 | INFO | RoutesTest | RoutesTest | Ending testcase RoutesTest > Verify that routes are detected correctly > Verify that routes are detected correctly [deploymentName: server-no-exposure, autoExposeAsService: false, exposeAsService: false, loadBalancer: false, #4] PASSED RoutesTest STANDARD_OUT 05:58:44 | INFO | RoutesTest | RoutesTest | Ending testsuite 05:58:44 | INFO | RoutesTest | RoutesTest | Checking if cluster is healthy after test 05:58:44 | DEBUG | RoutesTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries RuntimePolicyTest STANDARD_OUT 05:58:44 | INFO | RuntimePolicyTest | RuntimePolicyTest | Starting testsuite 05:58:44 | DEBUG | RuntimePolicyTest | OpenShift | Namespace qa already exists 05:58:45 | DEBUG | RuntimePolicyTest | Kubernetes | Told the orchestrator to createOrReplace runtimenginx 05:58:45 | DEBUG | RuntimePolicyTest | OpenShift | Namespace qa already exists 05:58:45 | DEBUG | RuntimePolicyTest | Kubernetes | Told the orchestrator to createOrReplace runtimeredis 05:58:45 | DEBUG | RuntimePolicyTest | Kubernetes | Waiting for runtimenginx to start 05:58:45 | DEBUG | RuntimePolicyTest | Kubernetes | Status of runtimenginx's pods: 05:58:45 | DEBUG | RuntimePolicyTest | Kubernetes | - runtimenginx-7fb699ff88-vpnp5 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:58:45 | DEBUG | RuntimePolicyTest | Kubernetes | 0/1 are in the ready state for runtimenginx 05:58:48 | DEBUG | RuntimePolicyTest | Kubernetes | Waiting for runtimenginx to start 05:58:48 | DEBUG | RuntimePolicyTest | Kubernetes | Status of runtimenginx's pods: 05:58:48 | DEBUG | RuntimePolicyTest | Kubernetes | - runtimenginx-7fb699ff88-vpnp5 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:58:45Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:58:48 | DEBUG | RuntimePolicyTest | Kubernetes | All 1 replicas found in ready state for runtimenginx 05:58:48 | DEBUG | RuntimePolicyTest | Kubernetes | Took 3 seconds for k8s deployment runtimenginx 05:58:48 | DEBUG | RuntimePolicyTest | Kubernetes | Updating deployment runtimenginx with 1 pods 05:58:48 | DEBUG | RuntimePolicyTest | Kubernetes | Waiting for runtimeredis to start 05:58:48 | DEBUG | RuntimePolicyTest | Kubernetes | Status of runtimeredis's pods: 05:58:48 | DEBUG | RuntimePolicyTest | Kubernetes | - runtimeredis-7b99fc6d65-6jjnb Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:58:45Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:58:48 | DEBUG | RuntimePolicyTest | Kubernetes | All 1 replicas found in ready state for runtimeredis 05:58:48 | DEBUG | RuntimePolicyTest | Kubernetes | Took 0 seconds for k8s deployment runtimeredis 05:58:48 | DEBUG | RuntimePolicyTest | Kubernetes | Updating deployment runtimeredis with 1 pods 05:58:48 | INFO | RuntimePolicyTest | Services | SR found deployment runtimenginx within 0s 05:58:48 | INFO | RuntimePolicyTest | Services | SR found deployment runtimeredis within 0s RuntimePolicyTest > Verify runtime policy : #policyName can be triggered - #depName > Verify runtime policy : Ubuntu Package Manager Execution can be triggered - runtimenginx STANDARD_OUT 05:58:48 | INFO | RuntimePolicyTest | RuntimePolicyTest | Starting testcase: Verify runtime policy : Ubuntu Package Manager Execution can be triggered - runtimenginx 05:58:48 | DEBUG | RuntimePolicyTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:58:48 | INFO | RuntimePolicyTest | Services | violation size is: 1 05:58:48 | INFO | RuntimePolicyTest | Services | Ubuntu Package Manager Execution triggered after waiting 0 seconds 05:58:48 | INFO | RuntimePolicyTest | RuntimePolicyTest | Ending testcase RuntimePolicyTest > Verify runtime policy : #policyName can be triggered - #depName > Verify runtime policy : Ubuntu Package Manager Execution can be triggered - runtimenginx PASSED RuntimePolicyTest > Verify runtime policy : #policyName can be triggered - #depName > Verify runtime policy : Ubuntu Package Manager Execution can be triggered - runtimeredis STANDARD_OUT 05:58:48 | INFO | RuntimePolicyTest | RuntimePolicyTest | Starting testcase: Verify runtime policy : Ubuntu Package Manager Execution can be triggered - runtimeredis 05:58:48 | DEBUG | RuntimePolicyTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:58:51 | DEBUG | RuntimePolicyTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:58:51 | INFO | RuntimePolicyTest | Services | violation size is: 1 05:58:51 | INFO | RuntimePolicyTest | Services | Ubuntu Package Manager Execution triggered after waiting 3 seconds 05:58:51 | INFO | RuntimePolicyTest | RuntimePolicyTest | Ending testcase RuntimePolicyTest > Verify runtime policy : #policyName can be triggered - #depName > Verify runtime policy : Ubuntu Package Manager Execution can be triggered - runtimeredis PASSED RuntimePolicyTest > Verify runtime alert violations are resolved once policy is removed STANDARD_OUT 05:58:51 | INFO | RuntimePolicyTest | RuntimePolicyTest | Starting testcase: Verify runtime alert violations are resolved once policy is removed 05:58:51 | DEBUG | RuntimePolicyTest | OpenShift | Namespace qa already exists 05:58:51 | DEBUG | RuntimePolicyTest | Kubernetes | Told the orchestrator to createOrReplace runtimeremoval 05:58:51 | DEBUG | RuntimePolicyTest | Kubernetes | Waiting for runtimeremoval to start 05:58:51 | DEBUG | RuntimePolicyTest | Kubernetes | Status of runtimeremoval's pods: 05:58:51 | DEBUG | RuntimePolicyTest | Kubernetes | - runtimeremoval-7fd5488db9-qdv88 Container status: [] 05:58:51 | DEBUG | RuntimePolicyTest | Kubernetes | 0/1 are in the ready state for runtimeremoval 05:58:54 | DEBUG | RuntimePolicyTest | Kubernetes | Waiting for runtimeremoval to start 05:58:54 | DEBUG | RuntimePolicyTest | Kubernetes | Status of runtimeremoval's pods: 05:58:54 | DEBUG | RuntimePolicyTest | Kubernetes | - runtimeremoval-7fd5488db9-qdv88 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:58:52Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:58:54 | DEBUG | RuntimePolicyTest | Kubernetes | All 1 replicas found in ready state for runtimeremoval 05:58:54 | DEBUG | RuntimePolicyTest | Kubernetes | Took 3 seconds for k8s deployment runtimeremoval 05:58:54 | DEBUG | RuntimePolicyTest | Kubernetes | Updating deployment runtimeremoval with 1 pods 05:58:54 | DEBUG | RuntimePolicyTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:58:54 | INFO | RuntimePolicyTest | Services | violation size is: 1 05:58:54 | INFO | RuntimePolicyTest | Services | runtime-removal-policy triggered after waiting 0 seconds 05:58:55 | DEBUG | RuntimePolicyTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:58:55 | INFO | RuntimePolicyTest | Services | violation size is: 1 05:58:55 | INFO | RuntimePolicyTest | Services | runtime-removal-policy triggered after waiting 0 seconds 05:58:55 | DEBUG | RuntimePolicyTest | Kubernetes | Removed the deployment: runtimeremoval 05:58:55 | INFO | RuntimePolicyTest | RuntimePolicyTest | Ending testcase RuntimePolicyTest > Verify runtime alert violations are resolved once policy is removed PASSED RuntimePolicyTest STANDARD_OUT 05:58:55 | DEBUG | RuntimePolicyTest | Kubernetes | Removed the deployment: runtimenginx 05:58:55 | DEBUG | RuntimePolicyTest | Kubernetes | Removed the deployment: runtimeredis 05:58:55 | INFO | RuntimePolicyTest | RuntimePolicyTest | Ending testsuite 05:58:55 | INFO | RuntimePolicyTest | RuntimePolicyTest | Checking if cluster is healthy after test 05:58:55 | DEBUG | RuntimePolicyTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries RuntimeViolationLifecycleTest STANDARD_OUT 05:58:55 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Starting testsuite RuntimeViolationLifecycleTest > Verify runtime excluded scope lifecycle STANDARD_OUT 05:58:55 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Starting testcase: Verify runtime excluded scope lifecycle 05:58:55 | DEBUG | RuntimeViolationLifecycle | OpenShift | Namespace qa already exists 05:58:55 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Told the orchestrator to createOrReplace runtimeviolationlifecycle 05:58:55 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Waiting for runtimeviolationlifecycle to start 05:58:55 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Status of runtimeviolationlifecycle's pods: 05:58:55 | DEBUG | RuntimeViolationLifecycle | Kubernetes | - runtimeviolationlifecycle-767975dd69-xl7gg Container status: [] 05:58:55 | DEBUG | RuntimeViolationLifecycle | Kubernetes | 0/1 are in the ready state for runtimeviolationlifecycle 05:58:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Waiting for runtimeviolationlifecycle to start 05:58:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Status of runtimeviolationlifecycle's pods: 05:58:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | - runtimeviolationlifecycle-767975dd69-xl7gg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:58:56Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:58:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | All 1 replicas found in ready state for runtimeviolationlifecycle 05:58:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Took 3 seconds for k8s deployment runtimeviolationlifecycle 05:58:58 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Updating deployment runtimeviolationlifecycle with 1 pods 05:58:58 | INFO | RuntimeViolationLifecycle | Services | SR found deployment runtimeviolationlifecycle within 0s 05:58:58 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolations with 3 retries 05:58:58 | INFO | RuntimeViolationLifecycle | Services | violation size is: 1 05:58:58 | INFO | RuntimeViolationLifecycle | Services | Ubuntu Package Manager Execution triggered after waiting 0 seconds 05:58:58 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolation with 3 retries 05:58:58 | INFO | RuntimeViolationLifecycle | Services | Updated Ubuntu Package Manager Execution to excluded scope runtimeviolationlifecycle 05:58:59 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolation with 3 retries 05:58:59 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Removed the deployment: runtimeviolationlifecycle 05:58:59 | DEBUG | RuntimeViolationLifecycle | Kubernetes | runtimeviolationlifecycle: deployment removed. 05:58:59 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Ending testcase RuntimeViolationLifecycleTest > Verify runtime excluded scope lifecycle PASSED RuntimeViolationLifecycleTest > Verify runtime alert remains after deletion STANDARD_OUT 05:58:59 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Starting testcase: Verify runtime alert remains after deletion 05:58:59 | DEBUG | RuntimeViolationLifecycle | OpenShift | Namespace qa already exists 05:58:59 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Told the orchestrator to createOrReplace runtimeviolationlifecycle 05:58:59 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Waiting for runtimeviolationlifecycle to start 05:58:59 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Status of runtimeviolationlifecycle's pods: 05:58:59 | DEBUG | RuntimeViolationLifecycle | Kubernetes | - runtimeviolationlifecycle-767975dd69-ngzjs Container status: [] 05:58:59 | DEBUG | RuntimeViolationLifecycle | Kubernetes | - runtimeviolationlifecycle-767975dd69-xl7gg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:58:56Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:58:59 | DEBUG | RuntimeViolationLifecycle | Kubernetes | 0/1 are in the ready state for runtimeviolationlifecycle 05:59:02 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Waiting for runtimeviolationlifecycle to start 05:59:02 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Status of runtimeviolationlifecycle's pods: 05:59:03 | DEBUG | RuntimeViolationLifecycle | Kubernetes | - runtimeviolationlifecycle-767975dd69-ngzjs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:59:00Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:59:03 | DEBUG | RuntimeViolationLifecycle | Kubernetes | - runtimeviolationlifecycle-767975dd69-xl7gg Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:58:56Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:59:03 | DEBUG | RuntimeViolationLifecycle | Kubernetes | All 1 replicas found in ready state for runtimeviolationlifecycle 05:59:03 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Took 3 seconds for k8s deployment runtimeviolationlifecycle 05:59:03 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Updating deployment runtimeviolationlifecycle with 2 pods 05:59:03 | INFO | RuntimeViolationLifecycle | Services | SR found deployment runtimeviolationlifecycle within 0s 05:59:03 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolations with 3 retries 05:59:03 | INFO | RuntimeViolationLifecycle | Services | violation size is: 1 05:59:03 | INFO | RuntimeViolationLifecycle | Services | Ubuntu Package Manager Execution triggered after waiting 0 seconds 05:59:03 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolation with 3 retries 05:59:03 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolation with 3 retries 05:59:03 | DEBUG | RuntimeViolationLifecycle | Kubernetes | Removed the deployment: runtimeviolationlifecycle 05:59:03 | DEBUG | RuntimeViolationLifecycle | Kubernetes | runtimeviolationlifecycle: deployment removed. 05:59:03 | INFO | RuntimeViolationLifecycle | Services | SR does not detect the deployment runtimeviolationlifecycle yet: io.grpc.StatusRuntimeException: NOT_FOUND: deployment with id 'aedb366d-6fb1-42a5-bf2a-01c3e2fd292d' does not exist: not found 05:59:03 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolations with 3 retries 05:59:03 | INFO | RuntimeViolationLifecycle | Services | violation size is: 1 05:59:03 | INFO | RuntimeViolationLifecycle | Services | Ubuntu Package Manager Execution triggered after waiting 0 seconds 05:59:03 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolation with 3 retries 05:59:03 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling services.AlertService.getViolation with 3 retries 05:59:03 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Ending testcase RuntimeViolationLifecycleTest > Verify runtime alert remains after deletion PASSED RuntimeViolationLifecycleTest STANDARD_OUT 05:59:03 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Ending testsuite 05:59:03 | INFO | RuntimeViolationLifecycle | RuntimeViolationLifecycle | Checking if cluster is healthy after test 05:59:03 | DEBUG | RuntimeViolationLifecycle | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries SACTest STANDARD_OUT 05:59:03 | INFO | SACTest | SACTest | Starting testsuite 05:59:03 | DEBUG | SACTest | Kubernetes | Removed the deployment: sac-deploymentnginx-qa1 05:59:03 | DEBUG | SACTest | Kubernetes | Removed the deployment: sac-deploymentnginx-qa2 05:59:03 | DEBUG | SACTest | Kubernetes | sac-deploymentnginx-qa1: deployment removed. 05:59:03 | DEBUG | SACTest | Kubernetes | sac-deploymentnginx-qa2: deployment removed. 05:59:03 | INFO | SACTest | OpenShift | Created namespace qa-test1 05:59:03 | INFO | SACTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-test1 namespace. 05:59:03 | DEBUG | SACTest | Kubernetes | quay: secret created. 05:59:03 | DEBUG | SACTest | Kubernetes | default-dockercfg-tkj7v: secret created. 05:59:03 | DEBUG | SACTest | Kubernetes | redhat-image-pull-secret: secret created. 05:59:03 | DEBUG | SACTest | Kubernetes | public-dockerhub: secret created. 05:59:03 | DEBUG | SACTest | Kubernetes | gcr-image-pull-secret: secret created. 05:59:04 | DEBUG | SACTest | OpenShift | Adding system:serviceaccount:qa-test1:default to anyuid user list 05:59:04 | DEBUG | SACTest | Kubernetes | Told the orchestrator to createOrReplace sac-deploymentnginx-qa1 05:59:04 | INFO | SACTest | OpenShift | Created namespace qa-test2 05:59:04 | INFO | SACTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-test2 namespace. 05:59:04 | DEBUG | SACTest | Kubernetes | quay: secret created. 05:59:04 | DEBUG | SACTest | Kubernetes | default-dockercfg-tkj7v: secret created. 05:59:04 | DEBUG | SACTest | Kubernetes | redhat-image-pull-secret: secret created. 05:59:04 | DEBUG | SACTest | Kubernetes | public-dockerhub: secret created. 05:59:04 | DEBUG | SACTest | Kubernetes | gcr-image-pull-secret: secret created. 05:59:04 | DEBUG | SACTest | OpenShift | Adding system:serviceaccount:qa-test2:default to anyuid user list 05:59:04 | DEBUG | SACTest | Kubernetes | Told the orchestrator to createOrReplace sac-deploymentnginx-qa2 05:59:04 | DEBUG | SACTest | Kubernetes | Waiting for sac-deploymentnginx-qa1 to start 05:59:04 | DEBUG | SACTest | Kubernetes | Status of sac-deploymentnginx-qa1's pods: 05:59:04 | DEBUG | SACTest | Kubernetes | - sac-deploymentnginx-qa1-6d946c8564-nfvlj Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 05:59:04 | DEBUG | SACTest | Kubernetes | 0/1 are in the ready state for sac-deploymentnginx-qa1 05:59:07 | DEBUG | SACTest | Kubernetes | Waiting for sac-deploymentnginx-qa1 to start 05:59:07 | DEBUG | SACTest | Kubernetes | Status of sac-deploymentnginx-qa1's pods: 05:59:07 | DEBUG | SACTest | Kubernetes | - sac-deploymentnginx-qa1-6d946c8564-nfvlj Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:59:04Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:59:07 | DEBUG | SACTest | Kubernetes | All 1 replicas found in ready state for sac-deploymentnginx-qa1 05:59:07 | DEBUG | SACTest | Kubernetes | Took 3 seconds for k8s deployment sac-deploymentnginx-qa1 05:59:07 | DEBUG | SACTest | Kubernetes | Updating deployment sac-deploymentnginx-qa1 with 1 pods 05:59:07 | DEBUG | SACTest | Kubernetes | Waiting for sac-deploymentnginx-qa2 to start 05:59:07 | DEBUG | SACTest | Kubernetes | Status of sac-deploymentnginx-qa2's pods: 05:59:07 | DEBUG | SACTest | Kubernetes | - sac-deploymentnginx-qa2-5dd989d545-8b7x2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T05:59:05Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 05:59:07 | DEBUG | SACTest | Kubernetes | All 1 replicas found in ready state for sac-deploymentnginx-qa2 05:59:07 | DEBUG | SACTest | Kubernetes | Took 0 seconds for k8s deployment sac-deploymentnginx-qa2 05:59:07 | DEBUG | SACTest | Kubernetes | Updating deployment sac-deploymentnginx-qa2 with 1 pods 05:59:07 | INFO | SACTest | Services | SR found deployment sac-deploymentnginx-qa1 within 0s 05:59:07 | INFO | SACTest | Services | SR found deployment sac-deploymentnginx-qa2 within 0s 05:59:07 | DEBUG | SACTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:59:10 | DEBUG | SACTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:59:10 | INFO | SACTest | Services | violation size is: 1 05:59:10 | INFO | SACTest | Services | Secure Shell (ssh) Port Exposed triggered after waiting 3 seconds 05:59:10 | DEBUG | SACTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:59:10 | INFO | SACTest | Services | violation size is: 1 05:59:10 | INFO | SACTest | Services | Secure Shell (ssh) Port Exposed triggered after waiting 0 seconds SACTest > Verify that only namespace #sacResource is visible when using SAC > Verify that only namespace qa-test2 is visible when using SAC STANDARD_OUT 05:59:11 | INFO | SACTest | SACTest | Starting testcase: Verify that only namespace qa-test2 is visible when using SAC 05:59:11 | INFO | SACTest | SACTest | [id: "651109db-4d7d-48bf-a18a-a2c7b8cc4ce1" name: "sac-deploymentnginx-qa2" cluster: "remote" cluster_id: "669e82d1-a7cf-43f8-a6b4-48c7fd9f6101" namespace: "qa-test2" created { seconds: 1764223144 } priority: 51 hash: 753981972286285333 ] 05:59:11 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify that only namespace #sacResource is visible when using SAC > Verify that only namespace qa-test2 is visible when using SAC PASSED SACTest > Verify alerts count is scoped STANDARD_OUT 05:59:11 | INFO | SACTest | SACTest | Starting testcase: Verify alerts count is scoped 05:59:11 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify alerts count is scoped PASSED SACTest > Verify ListSecrets using a token without access receives no results STANDARD_OUT 05:59:11 | INFO | SACTest | SACTest | Starting testcase: Verify ListSecrets using a token without access receives no results 05:59:11 | DEBUG | SACTest | Kubernetes | sac-secret: secret created. 05:59:11 | DEBUG | SACTest | Helpers | Calling services.SecretService.waitForSecret with 10 retries 05:59:11 | DEBUG | SACTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:59:17 | DEBUG | SACTest | Kubernetes | sac-secret: Secret removed. 05:59:17 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify ListSecrets using a token without access receives no results PASSED SACTest > Verify ListSecrets using a token with access receives some results STANDARD_OUT 05:59:17 | INFO | SACTest | SACTest | Starting testcase: Verify ListSecrets using a token with access receives some results 05:59:17 | DEBUG | SACTest | Kubernetes | sac-secret: secret created. 05:59:17 | DEBUG | SACTest | Helpers | Calling services.SecretService.waitForSecret with 10 retries 05:59:17 | DEBUG | SACTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:59:17 | DEBUG | SACTest | Kubernetes | sac-secret: secret created. 05:59:17 | DEBUG | SACTest | Helpers | Calling services.SecretService.waitForSecret with 10 retries 05:59:17 | DEBUG | SACTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:59:22 | DEBUG | SACTest | Kubernetes | sac-secret: Secret removed. 05:59:27 | DEBUG | SACTest | Kubernetes | sac-secret: Secret removed. 05:59:27 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify ListSecrets using a token with access receives some results PASSED SACTest > Verify Search on #category resources using the #tokenName token returns #numResults results > Verify Search on Cluster resources using the noAccess token returns 0 results STANDARD_OUT 05:59:27 | INFO | SACTest | SACTest | Starting testcase: Verify Search on Cluster resources using the noAccess token returns 0 results 05:59:27 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Search on #category resources using the #tokenName token returns #numResults results > Verify Search on Cluster resources using the noAccess token returns 0 results PASSED SACTest > Verify Search on #category resources using the #tokenName token returns #numResults results > Verify Search on Deployment resources using the searchDeploymentsToken token returns 1 results STANDARD_OUT 05:59:27 | INFO | SACTest | SACTest | Starting testcase: Verify Search on Deployment resources using the searchDeploymentsToken token returns 1 results 05:59:27 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Search on #category resources using the #tokenName token returns #numResults results > Verify Search on Deployment resources using the searchDeploymentsToken token returns 1 results PASSED SACTest > Verify Search on #category resources using the #tokenName token returns #numResults results > Verify Search on Image resources using the searchImagesToken token returns 1 results STANDARD_OUT 05:59:27 | INFO | SACTest | SACTest | Starting testcase: Verify Search on Image resources using the searchImagesToken token returns 1 results 05:59:27 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Search on #category resources using the #tokenName token returns #numResults results > Verify Search on Image resources using the searchImagesToken token returns 1 results PASSED SACTest > Verify Search on #category resources using the #tokenName token returns >= #minReturned results > Verify Search on Deployment resources using the searchAlertsToken token returns >= 1 results STANDARD_OUT 05:59:27 | INFO | SACTest | SACTest | Starting testcase: Verify Search on Deployment resources using the searchAlertsToken token returns >= 1 results 05:59:27 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Search on #category resources using the #tokenName token returns >= #minReturned results > Verify Search on Deployment resources using the searchAlertsToken token returns >= 1 results PASSED SACTest > Verify Search using the allAccessToken returns results for all search categories STANDARD_OUT 05:59:27 | INFO | SACTest | SACTest | Starting testcase: Verify Search using the allAccessToken returns results for all search categories 05:59:27 | DEBUG | SACTest | Kubernetes | sac-secret: secret created. 05:59:27 | DEBUG | SACTest | Helpers | Calling services.SecretService.waitForSecret with 10 retries 05:59:27 | DEBUG | SACTest | Helpers | Calling services.SecretService.getSecret with 50 retries 05:59:32 | DEBUG | SACTest | Kubernetes | sac-secret: Secret removed. 05:59:32 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Search using the allAccessToken returns results for all search categories PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Deployment resources using the noAccess token returns 0 results STANDARD_OUT 05:59:32 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Deployment resources using the noAccess token returns 0 results 05:59:32 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Deployment resources using the noAccess token returns 0 results PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Image resources using the noAccess token returns 0 results STANDARD_OUT 05:59:32 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Image resources using the noAccess token returns 0 results 05:59:32 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Image resources using the noAccess token returns 0 results PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Deployment resources using the searchDeploymentsToken token returns 1 results STANDARD_OUT 05:59:32 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Deployment resources using the searchDeploymentsToken token returns 1 results 05:59:33 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Deployment resources using the searchDeploymentsToken token returns 1 results PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Image resources using the searchImagesToken token returns 1 results STANDARD_OUT 05:59:33 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Image resources using the searchImagesToken token returns 1 results 05:59:33 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Image resources using the searchImagesToken token returns 1 results PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Namespace resources using the searchNamespacesToken token returns 1 results STANDARD_OUT 05:59:33 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Namespace resources using the searchNamespacesToken token returns 1 results 05:59:33 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns #numResults results > Verify Autocomplete on Namespace resources using the searchNamespacesToken token returns 1 results PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns >= to #minReturned results > Verify Autocomplete on Deployment resources using the allAccessToken token returns >= to 2 results STANDARD_OUT 05:59:33 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Deployment resources using the allAccessToken token returns >= to 2 results 05:59:33 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns >= to #minReturned results > Verify Autocomplete on Deployment resources using the allAccessToken token returns >= to 2 results PASSED SACTest > Verify Autocomplete on #category resources using the #tokenName token returns >= to #minReturned results > Verify Autocomplete on Image resources using the allAccessToken token returns >= to 1 results STANDARD_OUT 05:59:33 | INFO | SACTest | SACTest | Starting testcase: Verify Autocomplete on Image resources using the allAccessToken token returns >= to 1 results 05:59:33 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Autocomplete on #category resources using the #tokenName token returns >= to #minReturned results > Verify Autocomplete on Image resources using the allAccessToken token returns >= to 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Deployment service returns 0 results STANDARD_OUT 05:59:33 | INFO | SACTest | SACTest | Starting testcase: Verify using the noAccess token with the Deployment service returns 0 results 05:59:33 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Deployment service returns 0 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the searchDeploymentsToken token with the Deployment service returns 1 results STANDARD_OUT 05:59:33 | INFO | SACTest | SACTest | Starting testcase: Verify using the searchDeploymentsToken token with the Deployment service returns 1 results 05:59:33 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the searchDeploymentsToken token with the Deployment service returns 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Alert service returns 0 results STANDARD_OUT 05:59:33 | INFO | SACTest | SACTest | Starting testcase: Verify using the noAccess token with the Alert service returns 0 results 05:59:33 | DEBUG | SACTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:59:33 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Alert service returns 0 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Image service returns 0 results STANDARD_OUT 05:59:33 | INFO | SACTest | SACTest | Starting testcase: Verify using the noAccess token with the Image service returns 0 results 05:59:33 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Image service returns 0 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Namespace service returns 0 results STANDARD_OUT 05:59:33 | INFO | SACTest | SACTest | Starting testcase: Verify using the noAccess token with the Namespace service returns 0 results 05:59:33 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the noAccess token with the Namespace service returns 0 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the searchNamespacesToken token with the Namespace service returns 1 results STANDARD_OUT 05:59:33 | INFO | SACTest | SACTest | Starting testcase: Verify using the searchNamespacesToken token with the Namespace service returns 1 results 05:59:33 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the searchNamespacesToken token with the Namespace service returns 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the searchImagesToken token with the Image service returns 1 results STANDARD_OUT 05:59:33 | INFO | SACTest | SACTest | Starting testcase: Verify using the searchImagesToken token with the Image service returns 1 results 05:59:33 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns #numReturned results > Verify using the searchImagesToken token with the Image service returns 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Alert service returns >= to 1 results STANDARD_OUT 05:59:33 | INFO | SACTest | SACTest | Starting testcase: Verify using the allAccessToken token with the Alert service returns >= to 1 results 05:59:33 | DEBUG | SACTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:59:33 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Alert service returns >= to 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the searchAlertsToken token with the Alert service returns >= to 1 results STANDARD_OUT 05:59:33 | INFO | SACTest | SACTest | Starting testcase: Verify using the searchAlertsToken token with the Alert service returns >= to 1 results 05:59:34 | DEBUG | SACTest | Helpers | Calling services.AlertService.getViolations with 3 retries 05:59:34 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the searchAlertsToken token with the Alert service returns >= to 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Image service returns >= to 1 results STANDARD_OUT 05:59:34 | INFO | SACTest | SACTest | Starting testcase: Verify using the allAccessToken token with the Image service returns >= to 1 results 05:59:47 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Image service returns >= to 1 results PASSED SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Deployment service returns >= to 2 results STANDARD_OUT 05:59:47 | INFO | SACTest | SACTest | Starting testcase: Verify using the allAccessToken token with the Deployment service returns >= to 2 results 05:59:47 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Deployment service returns >= to 2 results PASSED SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Namespace service returns >= to 2 results STANDARD_OUT 05:59:47 | INFO | SACTest | SACTest | Starting testcase: Verify using the allAccessToken token with the Namespace service returns >= to 2 results 05:59:47 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token with the #service service returns >= to #minNumReturned results > Verify using the allAccessToken token with the Namespace service returns >= to 2 results PASSED SACTest > Verify Namespace service SAC is enforced properly when using the #tokenName token > Verify Namespace service SAC is enforced properly when using the noAccess token STANDARD_OUT 05:59:47 | INFO | SACTest | SACTest | Starting testcase: Verify Namespace service SAC is enforced properly when using the noAccess token 05:59:47 | ERROR | SACTest | NamespaceService | Could not find namespace 2fb34251-c516-4039-b454-78b4ec84189d io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Namespace '2fb34251-c516-4039-b454-78b4ec84189d' not found: invalid arguments at io.stackrox.proto.api.v1.NamespaceServiceGrpc$NamespaceServiceBlockingStub.getNamespace(NamespaceServiceGrpc.java:213) [3 skipped] at services.NamespaceService.getNamespace(NamespaceService.groovy:26) at SACTest.$spock_feature_1_11(SACTest.groovy:554) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:59:47 | ERROR | SACTest | NamespaceService | Could not find namespace dcfd3b7f-c0bd-4701-ba6e-bbdfcd3e5856 io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Namespace 'dcfd3b7f-c0bd-4701-ba6e-bbdfcd3e5856' not found: invalid arguments at io.stackrox.proto.api.v1.NamespaceServiceGrpc$NamespaceServiceBlockingStub.getNamespace(NamespaceServiceGrpc.java:213) [3 skipped] at services.NamespaceService.getNamespace(NamespaceService.groovy:26) at SACTest.$spock_feature_1_11(SACTest.groovy:555) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:59:48 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Namespace service SAC is enforced properly when using the #tokenName token > Verify Namespace service SAC is enforced properly when using the noAccess token PASSED SACTest > Verify Namespace service SAC is enforced properly when using the #tokenName token > Verify Namespace service SAC is enforced properly when using the searchNamespacesToken token STANDARD_OUT 05:59:48 | INFO | SACTest | SACTest | Starting testcase: Verify Namespace service SAC is enforced properly when using the searchNamespacesToken token 05:59:48 | ERROR | SACTest | NamespaceService | Could not find namespace dcfd3b7f-c0bd-4701-ba6e-bbdfcd3e5856 io.grpc.StatusRuntimeException: INVALID_ARGUMENT: Namespace 'dcfd3b7f-c0bd-4701-ba6e-bbdfcd3e5856' not found: invalid arguments at io.stackrox.proto.api.v1.NamespaceServiceGrpc$NamespaceServiceBlockingStub.getNamespace(NamespaceServiceGrpc.java:213) [3 skipped] at services.NamespaceService.getNamespace(NamespaceService.groovy:26) at SACTest.$spock_feature_1_11(SACTest.groovy:555) [1 skipped] at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [9 skipped] at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$6(NodeTestTask.java:151) [7 skipped] at org.junit.platform.engine.support.hierarchical.ThrowableCollector.execute(ThrowableCollector.java:73) at org.junit.platform.engine.support.hierarchical.NodeTestTask.lambda$executeRecursively$8(NodeTestTask.java:141) at util.OnFailureInterceptor.intercept(OnFailure.groovy:72) [6 skipped] at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) [4 skipped] [4 skipped] 05:59:48 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Namespace service SAC is enforced properly when using the #tokenName token > Verify Namespace service SAC is enforced properly when using the searchNamespacesToken token PASSED SACTest > Verify Namespace service SAC is enforced properly when using the #tokenName token > Verify Namespace service SAC is enforced properly when using the allAccessToken token STANDARD_OUT 05:59:48 | INFO | SACTest | SACTest | Starting testcase: Verify Namespace service SAC is enforced properly when using the allAccessToken token 05:59:48 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify Namespace service SAC is enforced properly when using the #tokenName token > Verify Namespace service SAC is enforced properly when using the allAccessToken token PASSED SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token noAccess yields the same number of results as restricted search STANDARD_OUT 05:59:48 | INFO | SACTest | SACTest | Starting testcase: Verify search with SAC and token noAccess yields the same number of results as restricted search 05:59:48 | INFO | SACTest | SACTest | With basic auth + restricted query: 0 05:59:48 | INFO | SACTest | SACTest | With all access token + restricted query: 0 05:59:48 | INFO | SACTest | SACTest | With SAC restricted token + unrestricted query: 0 05:59:48 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token noAccess yields the same number of results as restricted search PASSED SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token kubeSystemDeploymentsImagesToken yields the same number of results as restricted search STANDARD_OUT 05:59:48 | INFO | SACTest | SACTest | Starting testcase: Verify search with SAC and token kubeSystemDeploymentsImagesToken yields the same number of results as restricted search 05:59:49 | INFO | SACTest | SACTest | With basic auth + restricted query: 0 05:59:49 | INFO | SACTest | SACTest | With all access token + restricted query: 0 05:59:49 | INFO | SACTest | SACTest | With SAC restricted token + unrestricted query: 0 05:59:49 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token kubeSystemDeploymentsImagesToken yields the same number of results as restricted search PASSED SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token searchNamespacesToken yields the same number of results as restricted search STANDARD_OUT 05:59:49 | INFO | SACTest | SACTest | Starting testcase: Verify search with SAC and token searchNamespacesToken yields the same number of results as restricted search 05:59:49 | INFO | SACTest | SACTest | With basic auth + restricted query: 1 05:59:49 | INFO | SACTest | SACTest | With all access token + restricted query: 1 05:59:49 | INFO | SACTest | SACTest | With SAC restricted token + unrestricted query: 1 05:59:49 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token searchNamespacesToken yields the same number of results as restricted search PASSED SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token searchDeploymentsToken yields the same number of results as restricted search STANDARD_OUT 05:59:49 | INFO | SACTest | SACTest | Starting testcase: Verify search with SAC and token searchDeploymentsToken yields the same number of results as restricted search 05:59:49 | INFO | SACTest | SACTest | With basic auth + restricted query: 1 05:59:49 | INFO | SACTest | SACTest | With all access token + restricted query: 1 05:59:49 | INFO | SACTest | SACTest | With SAC restricted token + unrestricted query: 1 05:59:49 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token searchDeploymentsToken yields the same number of results as restricted search PASSED SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token searchDeploymentsImagesToken yields the same number of results as restricted search STANDARD_OUT 05:59:49 | INFO | SACTest | SACTest | Starting testcase: Verify search with SAC and token searchDeploymentsImagesToken yields the same number of results as restricted search 05:59:49 | INFO | SACTest | SACTest | With basic auth + restricted query: 1 05:59:49 | INFO | SACTest | SACTest | With all access token + restricted query: 1 05:59:49 | INFO | SACTest | SACTest | With SAC restricted token + unrestricted query: 1 05:59:49 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify search with SAC and token #tokenName yields the same number of results as restricted search > Verify search with SAC and token searchDeploymentsImagesToken yields the same number of results as restricted search PASSED SACTest > Verify that SAC has the same effect as query restriction for network flows STANDARD_OUT 05:59:49 | INFO | SACTest | SACTest | Starting testcase: Verify that SAC has the same effect as query restriction for network flows 05:59:49 | INFO | SACTest | SACTest | allAccessFlows: [stackrox/scanner -> openshift-dns/dns-default, stackrox/collector -> stackrox/sensor, stackrox/config-controller -> openshift-dns/dns-default, openshift-operator-lifecycle-manager/packageserver -> stackrox-operator/stackrox-operator-test-index-95jpb, openshift-kube-apiserver/kube-apiserver-ip-10-0-2-27.ec2.internal -> stackrox/admission-control, openshift-kube-apiserver/kube-apiserver-ip-10-0-97-71.ec2.internal -> stackrox/admission-control, stackrox/central -> openshift-dns/dns-default, openshift-kube-apiserver-operator/kube-apiserver-operator -> stackrox/admission-control, stackrox/scanner -> stackrox/central, openshift-monitoring/prometheus-k8s -> stackrox/sensor, openshift-monitoring/prometheus-k8s -> stackrox/central, stackrox/central -> openshift-image-registry/image-registry, openshift-operator-lifecycle-manager/catalog-operator -> stackrox-operator/stackrox-operator-test-index-95jpb, stackrox/central -> INTERNET, openshift-kube-apiserver/kube-apiserver-ip-10-0-4-174.ec2.internal -> stackrox/admission-control, stackrox/central -> stackrox/central-db, stackrox/scanner -> stackrox/scanner-db, stackrox/central -> stackrox/scanner, stackrox/config-controller -> stackrox/central, stackrox/sensor -> stackrox/central, stackrox/admission-control -> stackrox/sensor] 05:59:49 | INFO | SACTest | SACTest | allAccessFlowsWithoutNeighbors: [stackrox/collector -> stackrox/sensor, stackrox/scanner -> stackrox/central, stackrox/central -> INTERNET, stackrox/central -> stackrox/central-db, stackrox/scanner -> stackrox/scanner-db, stackrox/central -> stackrox/scanner, stackrox/config-controller -> stackrox/central, stackrox/sensor -> stackrox/central, stackrox/admission-control -> stackrox/sensor] 05:59:49 | INFO | SACTest | SACTest | sacFlows: [stackrox/collector -> stackrox/sensor, masked namespace #4/masked deployment #7 -> stackrox/admission-control, stackrox/central -> masked namespace #1/masked deployment #1, masked namespace #5/masked deployment #6 -> stackrox/central, stackrox/central -> masked namespace #2/masked deployment #2, masked namespace #3/masked deployment #5 -> stackrox/admission-control, stackrox/config-controller -> masked namespace #1/masked deployment #1, stackrox/scanner -> stackrox/central, masked namespace #3/masked deployment #4 -> stackrox/admission-control, stackrox/central -> INTERNET, stackrox/central -> stackrox/central-db, stackrox/scanner -> stackrox/scanner-db, stackrox/scanner -> masked namespace #1/masked deployment #1, stackrox/central -> stackrox/scanner, stackrox/config-controller -> stackrox/central, masked namespace #5/masked deployment #6 -> stackrox/sensor, stackrox/sensor -> stackrox/central, stackrox/admission-control -> stackrox/sensor, masked namespace #3/masked deployment #3 -> stackrox/admission-control] 05:59:49 | INFO | SACTest | SACTest | sacFlowsNoQuery: [stackrox/collector -> stackrox/sensor, masked namespace #4/masked deployment #7 -> stackrox/admission-control, stackrox/central -> masked namespace #1/masked deployment #1, masked namespace #5/masked deployment #6 -> stackrox/central, stackrox/central -> masked namespace #2/masked deployment #2, masked namespace #3/masked deployment #5 -> stackrox/admission-control, stackrox/config-controller -> masked namespace #1/masked deployment #1, stackrox/scanner -> stackrox/central, masked namespace #3/masked deployment #4 -> stackrox/admission-control, stackrox/central -> INTERNET, stackrox/central -> stackrox/central-db, stackrox/scanner -> masked namespace #1/masked deployment #1, stackrox/scanner -> stackrox/scanner-db, stackrox/central -> stackrox/scanner, stackrox/config-controller -> stackrox/central, masked namespace #5/masked deployment #6 -> stackrox/sensor, stackrox/sensor -> stackrox/central, stackrox/admission-control -> stackrox/sensor, masked namespace #3/masked deployment #3 -> stackrox/admission-control] 05:59:49 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify that SAC has the same effect as query restriction for network flows PASSED SACTest > test role aggregation should not combine permissions sets STANDARD_OUT 05:59:49 | INFO | SACTest | SACTest | Starting testcase: test role aggregation should not combine permissions sets 05:59:49 | INFO | SACTest | SACTest | Ending testcase SACTest > test role aggregation should not combine permissions sets PASSED SACTest > Verify using the #tokenName token gets #numResults results when retrieving the current cluster > Verify using the noAccess token gets 0 results when retrieving the current cluster STANDARD_OUT 05:59:49 | INFO | SACTest | SACTest | Starting testcase: Verify using the noAccess token gets 0 results when retrieving the current cluster 05:59:49 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token gets #numResults results when retrieving the current cluster > Verify using the noAccess token gets 0 results when retrieving the current cluster PASSED SACTest > Verify using the #tokenName token gets #numResults results when retrieving the current cluster > Verify using the getClusterToken token gets 1 results when retrieving the current cluster STANDARD_OUT 05:59:49 | INFO | SACTest | SACTest | Starting testcase: Verify using the getClusterToken token gets 1 results when retrieving the current cluster 05:59:49 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token gets #numResults results when retrieving the current cluster > Verify using the getClusterToken token gets 1 results when retrieving the current cluster PASSED SACTest > Verify using the #tokenName token gets #numResults results when retrieving the current cluster > Verify using the allAccessToken token gets 1 results when retrieving the current cluster STANDARD_OUT 05:59:49 | INFO | SACTest | SACTest | Starting testcase: Verify using the allAccessToken token gets 1 results when retrieving the current cluster 05:59:49 | INFO | SACTest | SACTest | Ending testcase SACTest > Verify using the #tokenName token gets #numResults results when retrieving the current cluster > Verify using the allAccessToken token gets 1 results when retrieving the current cluster PASSED SACTest STANDARD_OUT 05:59:50 | DEBUG | SACTest | Kubernetes | Removed the deployment: sac-deploymentnginx-qa1 05:59:50 | DEBUG | SACTest | Kubernetes | Removed the deployment: sac-deploymentnginx-qa2 05:59:50 | DEBUG | SACTest | Kubernetes | Waiting for namespace qa-test1 to be deleted 05:59:50 | DEBUG | SACTest | Kubernetes | Retrying in 3... 05:59:53 | DEBUG | SACTest | Kubernetes | Retrying in 3... 05:59:56 | DEBUG | SACTest | Kubernetes | K8s found that namespace qa-test1 was deleted 05:59:56 | DEBUG | SACTest | Kubernetes | Waiting for namespace qa-test1 to be deleted 05:59:56 | DEBUG | SACTest | Kubernetes | K8s found that namespace qa-test1 was deleted 05:59:56 | DEBUG | SACTest | Kubernetes | Waiting for namespace qa-test2 to be deleted 05:59:56 | DEBUG | SACTest | Kubernetes | Retrying in 3... 05:59:59 | DEBUG | SACTest | Kubernetes | Retrying in 3... 06:00:02 | DEBUG | SACTest | Kubernetes | K8s found that namespace qa-test2 was deleted 06:00:02 | DEBUG | SACTest | Kubernetes | Waiting for namespace qa-test2 to be deleted 06:00:02 | DEBUG | SACTest | Kubernetes | K8s found that namespace qa-test2 was deleted 06:00:02 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role f7644eeb-1272-4213-8566-1e240f66c5de and permission set 06:00:02 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role f7644eeb-1272-4213-8566-1e240f66c5de or associated access scope: io.grpc.StatusRuntimeException: INVALID_ARGUMENT: failed to delete access scope ffffffff-ffff-fff4-f5ff-fffffffffffe: default access scope "Deny All" cannot be modified or deleted: invalid arguments 06:00:02 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 07f921ed-c432-45f5-bf5a-9ad6d55286f4 and permission set 06:00:02 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role 07f921ed-c432-45f5-bf5a-9ad6d55286f4 or associated access scope: io.grpc.StatusRuntimeException: INVALID_ARGUMENT: failed to delete access scope ffffffff-ffff-fff4-f5ff-ffffffffffff: default access scope "Unrestricted" cannot be modified or deleted: invalid arguments 06:00:02 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 9294d06c-3dff-4e76-ac37-9b97ff72281b and permission set 06:00:02 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role 9294d06c-3dff-4e76-ac37-9b97ff72281b or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope 5f2dc94a-d3d1-4185-ad4c-13daafcc36d9: cannot delete access scope in use by role "SACv2 Test Automation Role feda9ca4-f058-465c-81f3-2e083012b568": referenced by another object 06:00:02 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role e33637c3-a8fa-4975-8319-9c040b653a0b and permission set 06:00:02 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role e33637c3-a8fa-4975-8319-9c040b653a0b or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope ab9493ec-5092-4e8e-810c-95f36dd5fe7c: cannot delete access scope in use by role "SACv2 Test Automation Role 2f9a65a4-923b-4b3e-967e-190cee3645a7": referenced by another object 06:00:02 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role b95f27a1-d15d-4300-879b-0fe52e874d33 and permission set 06:00:02 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role b95f27a1-d15d-4300-879b-0fe52e874d33 or associated access scope: io.grpc.StatusRuntimeException: INVALID_ARGUMENT: failed to delete access scope ffffffff-ffff-fff4-f5ff-ffffffffffff: default access scope "Unrestricted" cannot be modified or deleted: invalid arguments 06:00:02 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 2f9a65a4-923b-4b3e-967e-190cee3645a7 and permission set 06:00:02 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role 2f9a65a4-923b-4b3e-967e-190cee3645a7 or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope ab9493ec-5092-4e8e-810c-95f36dd5fe7c: cannot delete access scope in use by role "SACv2 Test Automation Role f5e18a44-610a-4fcc-a79a-0bffb98b5101": referenced by another object 06:00:02 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role f5e18a44-610a-4fcc-a79a-0bffb98b5101 and permission set 06:00:02 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role f5e18a44-610a-4fcc-a79a-0bffb98b5101 or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope ab9493ec-5092-4e8e-810c-95f36dd5fe7c: cannot delete access scope in use by role "SACv2 Test Automation Role 50f6c723-0bd7-45ec-9f71-3753245c253d": referenced by another object 06:00:02 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 50f6c723-0bd7-45ec-9f71-3753245c253d and permission set 06:00:02 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role 50f6c723-0bd7-45ec-9f71-3753245c253d or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope ab9493ec-5092-4e8e-810c-95f36dd5fe7c: cannot delete access scope in use by role "SACv2 Test Automation Role 17f06ddb-f274-4054-96ca-8d675a697e76": referenced by another object 06:00:03 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 17f06ddb-f274-4054-96ca-8d675a697e76 and permission set 06:00:03 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role 17f06ddb-f274-4054-96ca-8d675a697e76 or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope ab9493ec-5092-4e8e-810c-95f36dd5fe7c: cannot delete access scope in use by role "SACv2 Test Automation Role daa04917-1318-4978-91a6-e998a63e5cde": referenced by another object 06:00:03 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role daa04917-1318-4978-91a6-e998a63e5cde and permission set 06:00:03 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role daa04917-1318-4978-91a6-e998a63e5cde or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope ab9493ec-5092-4e8e-810c-95f36dd5fe7c: cannot delete access scope in use by role "SACv2 Test Automation Role b2aa8dc0-1267-4dfe-bbee-ac084e394688": referenced by another object 06:00:03 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 561f8c29-f03d-4ee1-b15e-56a2f6030c01 and permission set 06:00:03 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 1c0a50e3-5fba-4e1d-afb5-d82e3150d68d and permission set 06:00:03 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role 1c0a50e3-5fba-4e1d-afb5-d82e3150d68d or associated access scope: io.grpc.StatusRuntimeException: INVALID_ARGUMENT: failed to delete access scope ffffffff-ffff-fff4-f5ff-ffffffffffff: default access scope "Unrestricted" cannot be modified or deleted: invalid arguments 06:00:03 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 8592c9eb-7c79-49d9-9426-ad802139fd87 and permission set 06:00:03 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role feda9ca4-f058-465c-81f3-2e083012b568 and permission set 06:00:03 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role b2aa8dc0-1267-4dfe-bbee-ac084e394688 and permission set 06:00:03 | ERROR | SACTest | SACTest | Error deleting role SACv2 Test Automation Role b2aa8dc0-1267-4dfe-bbee-ac084e394688 or associated access scope: io.grpc.StatusRuntimeException: FAILED_PRECONDITION: failed to delete access scope ab9493ec-5092-4e8e-810c-95f36dd5fe7c: cannot delete access scope in use by role "SACv2 Test Automation Role 2992f1d3-0208-4411-884d-9d311f618825": referenced by another object 06:00:03 | INFO | SACTest | RoleService | Deleted role: SACv2 Test Automation Role 2992f1d3-0208-4411-884d-9d311f618825 and permission set 06:00:03 | INFO | SACTest | SACTest | Ending testsuite 06:00:03 | INFO | SACTest | SACTest | Checking if cluster is healthy after test 06:00:03 | DEBUG | SACTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries SecretsTest STANDARD_OUT 06:00:03 | INFO | SecretsTest | SecretsTest | Starting testsuite SecretsTest > Verify the secret api can return the secret's information when adding a new secret STANDARD_OUT 06:00:03 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret api can return the secret's information when adding a new secret 06:00:03 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 06:00:03 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 06:00:08 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 06:00:08 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret api can return the secret's information when adding a new secret PASSED SecretsTest > Verify the secret item should show the binding deployments (from env var: #fromEnv) > Verify the secret item should show the binding deployments (from env var: false) STANDARD_OUT 06:00:08 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret item should show the binding deployments (from env var: false) 06:00:09 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 06:00:09 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:00:09 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets 06:00:09 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 06:00:09 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 06:00:09 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-fxltn Container status: [] 06:00:09 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets 06:00:12 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 06:00:12 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 06:00:12 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-fxltn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:09Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:12 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets 06:00:12 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets 06:00:12 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets with 1 pods 06:00:12 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 06:00:12 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets 06:00:12 | DEBUG | SecretsTest | Kubernetes | depwithsecrets: deployment removed. 06:00:17 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 06:00:17 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret item should show the binding deployments (from env var: #fromEnv) > Verify the secret item should show the binding deployments (from env var: false) PASSED SecretsTest > Verify the secret item should show the binding deployments (from env var: #fromEnv) > Verify the secret item should show the binding deployments (from env var: true) STANDARD_OUT 06:00:17 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret item should show the binding deployments (from env var: true) 06:00:17 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 06:00:17 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:00:17 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets 06:00:17 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 06:00:17 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 06:00:17 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-2btsr Container status: [] 06:00:17 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-fxltn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:09Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:17 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets 06:00:20 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 06:00:20 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 06:00:20 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-2btsr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:18Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:20 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-fxltn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:09Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:20 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets 06:00:20 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets 06:00:20 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets with 2 pods 06:00:20 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 06:00:20 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets 06:00:20 | DEBUG | SecretsTest | Kubernetes | depwithsecrets: deployment removed. 06:00:25 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 06:00:25 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret item should show the binding deployments (from env var: #fromEnv) > Verify the secret item should show the binding deployments (from env var: true) PASSED SecretsTest > Verify the secret should not show the deleted binding deployment (from env var: #fromEnv) > Verify the secret should not show the deleted binding deployment (from env var: false) STANDARD_OUT 06:00:25 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret should not show the deleted binding deployment (from env var: false) 06:00:25 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 06:00:25 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:00:25 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets 06:00:25 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 06:00:25 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 06:00:25 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-2btsr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:18Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:25 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-fxltn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:09Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:25 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-jcxgd Container status: [] 06:00:25 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets 06:00:28 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 06:00:28 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 06:00:28 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-2btsr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:18Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:28 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-fxltn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:09Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:28 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-jcxgd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:26Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:28 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets 06:00:28 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets 06:00:28 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets with 3 pods 06:00:28 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 06:00:28 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets 06:00:28 | DEBUG | SecretsTest | Kubernetes | depwithsecrets: deployment removed. 06:00:28 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 06:00:33 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 06:00:33 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret should not show the deleted binding deployment (from env var: #fromEnv) > Verify the secret should not show the deleted binding deployment (from env var: false) PASSED SecretsTest > Verify the secret should not show the deleted binding deployment (from env var: #fromEnv) > Verify the secret should not show the deleted binding deployment (from env var: true) STANDARD_OUT 06:00:33 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret should not show the deleted binding deployment (from env var: true) 06:00:33 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 06:00:33 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:00:33 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets 06:00:33 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 06:00:33 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 06:00:33 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-2btsr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:18Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:33 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-f9j2z Container status: [] 06:00:33 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-fxltn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:09Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:33 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-jcxgd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:26Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:33 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets 06:00:36 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 06:00:36 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 06:00:36 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-2btsr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:18Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:36 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-f9j2z Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:34Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:36 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-fxltn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:09Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:36 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-jcxgd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:26Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:36 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets 06:00:36 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets 06:00:36 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets with 4 pods 06:00:36 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 06:00:36 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets 06:00:37 | DEBUG | SecretsTest | Kubernetes | depwithsecrets: deployment removed. 06:00:37 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 06:00:42 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 06:00:42 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret should not show the deleted binding deployment (from env var: #fromEnv) > Verify the secret should not show the deleted binding deployment (from env var: true) PASSED SecretsTest > Verify the secret information should not be infected by the previous secrets (from env var: #fromEnv) > Verify the secret information should not be infected by the previous secrets (from env var: false) STANDARD_OUT 06:00:42 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret information should not be infected by the previous secrets (from env var: false) 06:00:42 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 06:00:42 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:00:42 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets 06:00:42 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 06:00:42 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 06:00:42 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-2btsr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:18Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:42 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-f9j2z Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:34Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:42 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-fl2db Container status: [] 06:00:42 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-fxltn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:09Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:42 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-jcxgd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:26Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:42 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets 06:00:45 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 06:00:45 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 06:00:45 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-2btsr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:18Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:45 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-f9j2z Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:34Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:45 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-fl2db Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:42Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:45 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-jcxgd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:26Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:45 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets 06:00:45 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets 06:00:45 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets with 4 pods 06:00:45 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets 06:00:45 | DEBUG | SecretsTest | Kubernetes | depwithsecrets: deployment removed. 06:00:45 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:00:45 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecretssec 06:00:45 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecretssec to start 06:00:45 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecretssec's pods: 06:00:45 | DEBUG | SecretsTest | Kubernetes | - depwithsecretssec-db9796b77-svhl5 Container status: [] 06:00:45 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecretssec 06:00:48 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecretssec to start 06:00:48 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecretssec's pods: 06:00:48 | DEBUG | SecretsTest | Kubernetes | - depwithsecretssec-db9796b77-svhl5 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:46Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:48 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecretssec 06:00:48 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecretssec 06:00:48 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecretssec with 1 pods 06:00:48 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 06:00:48 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecretssec 06:00:48 | DEBUG | SecretsTest | Kubernetes | depwithsecretssec: deployment removed. 06:00:53 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 06:00:53 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret information should not be infected by the previous secrets (from env var: #fromEnv) > Verify the secret information should not be infected by the previous secrets (from env var: false) PASSED SecretsTest > Verify the secret information should not be infected by the previous secrets (from env var: #fromEnv) > Verify the secret information should not be infected by the previous secrets (from env var: true) STANDARD_OUT 06:00:53 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify the secret information should not be infected by the previous secrets (from env var: true) 06:00:53 | DEBUG | SecretsTest | Kubernetes | qasec: secret created. 06:00:53 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:00:53 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets 06:00:53 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 06:00:53 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 06:00:53 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-f9j2z Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:34Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:53 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-svxlt Container status: [] 06:00:53 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-fl2db Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:42Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:53 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-jcxgd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:26Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:53 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets 06:00:56 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets to start 06:00:56 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets's pods: 06:00:56 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-f9j2z Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:34Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:56 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6bf799dbdf-svxlt Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:54Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:56 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-fl2db Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:42Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:56 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets-6c99b8b8d9-jcxgd Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:26Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:56 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets 06:00:56 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets 06:00:56 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets with 4 pods 06:00:56 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets 06:00:56 | DEBUG | SecretsTest | Kubernetes | depwithsecrets: deployment removed. 06:00:56 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:00:56 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecretssec 06:00:56 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecretssec to start 06:00:56 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecretssec's pods: 06:00:56 | DEBUG | SecretsTest | Kubernetes | - depwithsecretssec-b67db675c-fkpnn Container status: [] 06:00:56 | DEBUG | SecretsTest | Kubernetes | - depwithsecretssec-db9796b77-svhl5 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:46Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:56 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecretssec 06:00:59 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecretssec to start 06:00:59 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecretssec's pods: 06:00:59 | DEBUG | SecretsTest | Kubernetes | - depwithsecretssec-b67db675c-fkpnn Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:57Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:59 | DEBUG | SecretsTest | Kubernetes | - depwithsecretssec-db9796b77-svhl5 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:00:46Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:00:59 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecretssec 06:00:59 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecretssec 06:00:59 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecretssec with 2 pods 06:00:59 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 06:00:59 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecretssec 06:00:59 | DEBUG | SecretsTest | Kubernetes | depwithsecretssec: deployment removed. 06:01:04 | DEBUG | SecretsTest | Kubernetes | qasec: Secret removed. 06:01:04 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify the secret information should not be infected by the previous secrets (from env var: #fromEnv) > Verify the secret information should not be infected by the previous secrets (from env var: true) PASSED SecretsTest > Verify secrets page should not be messed up when a deployment's secret changed (from env var: #fromEnv) > Verify secrets page should not be messed up when a deployment's secret changed (from env var: false) STANDARD_OUT 06:01:04 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify secrets page should not be messed up when a deployment's secret changed (from env var: false) 06:01:04 | DEBUG | SecretsTest | Kubernetes | qasec1: secret created. 06:01:04 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:01:04 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets1 06:01:04 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 06:01:04 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 06:01:04 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-vmbt2 Container status: [] 06:01:04 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets1 06:01:07 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 06:01:07 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 06:01:07 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-vmbt2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:05Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:07 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets1 06:01:07 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets1 06:01:07 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets1 with 1 pods 06:01:08 | DEBUG | SecretsTest | Kubernetes | qasec2: secret created. 06:01:08 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:01:08 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets2 06:01:08 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 06:01:08 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 06:01:08 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-gt7vx Container status: [] 06:01:08 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets2 06:01:11 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 06:01:11 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 06:01:11 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-gt7vx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:11 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets2 06:01:11 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets2 06:01:11 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets2 with 1 pods 06:01:11 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets1 06:01:11 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets2 06:01:11 | DEBUG | SecretsTest | Kubernetes | depwithsecrets1: deployment removed. 06:01:11 | DEBUG | SecretsTest | Kubernetes | depwithsecrets2: deployment removed. 06:01:11 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:01:11 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets1 06:01:11 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 06:01:11 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 06:01:11 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-6f6978b469-4zxgs Container status: [] 06:01:11 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-vmbt2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:05Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:11 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets1 06:01:14 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 06:01:14 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 06:01:14 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-6f6978b469-4zxgs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:14 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-vmbt2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:05Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:14 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets1 06:01:14 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets1 06:01:14 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets1 with 2 pods 06:01:14 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:01:14 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets2 06:01:14 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 06:01:14 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 06:01:14 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-gt7vx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:14 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-86547fd56b-nmvd2 Container status: [] 06:01:14 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets2 06:01:17 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 06:01:17 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 06:01:17 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-gt7vx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:17 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-86547fd56b-nmvd2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:15Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:17 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets2 06:01:17 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets2 06:01:17 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets2 with 2 pods 06:01:17 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 06:01:17 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 06:01:17 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets1 06:01:17 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets2 06:01:17 | DEBUG | SecretsTest | Kubernetes | depwithsecrets1: deployment removed. 06:01:17 | DEBUG | SecretsTest | Kubernetes | depwithsecrets2: deployment removed. 06:01:22 | DEBUG | SecretsTest | Kubernetes | qasec1: Secret removed. 06:01:27 | DEBUG | SecretsTest | Kubernetes | qasec2: Secret removed. 06:01:27 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify secrets page should not be messed up when a deployment's secret changed (from env var: #fromEnv) > Verify secrets page should not be messed up when a deployment's secret changed (from env var: false) PASSED SecretsTest > Verify secrets page should not be messed up when a deployment's secret changed (from env var: #fromEnv) > Verify secrets page should not be messed up when a deployment's secret changed (from env var: true) STANDARD_OUT 06:01:27 | INFO | SecretsTest | SecretsTest | Starting testcase: Verify secrets page should not be messed up when a deployment's secret changed (from env var: true) 06:01:27 | DEBUG | SecretsTest | Kubernetes | qasec1: secret created. 06:01:27 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:01:27 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets1 06:01:27 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 06:01:27 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 06:01:27 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-6f6978b469-4zxgs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:27 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-vmbt2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:05Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:27 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-866df45d68-ft4wx Container status: [] 06:01:27 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets1 06:01:30 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 06:01:30 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 06:01:30 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-6f6978b469-4zxgs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:30 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-vmbt2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:05Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:30 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-866df45d68-ft4wx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:28Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:30 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets1 06:01:30 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets1 06:01:30 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets1 with 3 pods 06:01:30 | DEBUG | SecretsTest | Kubernetes | qasec2: secret created. 06:01:30 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:01:30 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets2 06:01:30 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 06:01:30 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 06:01:30 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-gt7vx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:30 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-7f794b4c8f-xfcsr Container status: [] 06:01:30 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-86547fd56b-nmvd2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:15Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:30 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets2 06:01:33 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 06:01:33 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 06:01:34 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-gt7vx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:34 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-7f794b4c8f-xfcsr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:31Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:34 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-86547fd56b-nmvd2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:15Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:34 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets2 06:01:34 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets2 06:01:34 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets2 with 3 pods 06:01:34 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets1 06:01:34 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets2 06:01:34 | DEBUG | SecretsTest | Kubernetes | depwithsecrets1: deployment removed. 06:01:34 | DEBUG | SecretsTest | Kubernetes | depwithsecrets2: deployment removed. 06:01:34 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:01:34 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets1 06:01:34 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 06:01:34 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 06:01:34 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-6f6978b469-4zxgs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:34 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-747d665f69-4gbmt Container status: [] 06:01:34 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-vmbt2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:05Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:34 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-866df45d68-ft4wx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:28Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:34 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets1 06:01:37 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets1 to start 06:01:37 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets1's pods: 06:01:37 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-6f6978b469-4zxgs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:12Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:37 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-747d665f69-4gbmt Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:34Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:37 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-79f485cdfb-vmbt2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:05Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:37 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets1-866df45d68-ft4wx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:28Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:37 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets1 06:01:37 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets1 06:01:37 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets1 with 4 pods 06:01:37 | DEBUG | SecretsTest | OpenShift | Namespace qa already exists 06:01:37 | DEBUG | SecretsTest | Kubernetes | Told the orchestrator to createOrReplace depwithsecrets2 06:01:37 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 06:01:37 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 06:01:37 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-gt7vx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:37 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-7f794b4c8f-xfcsr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:31Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:37 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-86547fd56b-nmvd2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:15Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:37 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-fcdb8cb9b-27tgk Container status: [] 06:01:37 | DEBUG | SecretsTest | Kubernetes | 0/1 are in the ready state for depwithsecrets2 06:01:40 | DEBUG | SecretsTest | Kubernetes | Waiting for depwithsecrets2 to start 06:01:40 | DEBUG | SecretsTest | Kubernetes | Status of depwithsecrets2's pods: 06:01:40 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-6c68668dbc-gt7vx Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:08Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:40 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-7f794b4c8f-xfcsr Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:31Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:40 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-86547fd56b-nmvd2 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:15Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:40 | DEBUG | SecretsTest | Kubernetes | - depwithsecrets2-fcdb8cb9b-27tgk Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:01:37Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:01:40 | DEBUG | SecretsTest | Kubernetes | All 1 replicas found in ready state for depwithsecrets2 06:01:40 | DEBUG | SecretsTest | Kubernetes | Took 3 seconds for k8s deployment depwithsecrets2 06:01:40 | DEBUG | SecretsTest | Kubernetes | Updating deployment depwithsecrets2 with 4 pods 06:01:40 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 06:01:40 | DEBUG | SecretsTest | Helpers | Calling services.SecretService.getSecret with 50 retries 06:01:40 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets1 06:01:40 | DEBUG | SecretsTest | Kubernetes | Removed the deployment: depwithsecrets2 06:01:40 | DEBUG | SecretsTest | Kubernetes | depwithsecrets1: deployment removed. 06:01:40 | DEBUG | SecretsTest | Kubernetes | depwithsecrets2: deployment removed. 06:01:45 | DEBUG | SecretsTest | Kubernetes | qasec1: Secret removed. 06:01:50 | DEBUG | SecretsTest | Kubernetes | qasec2: Secret removed. 06:01:50 | INFO | SecretsTest | SecretsTest | Ending testcase SecretsTest > Verify secrets page should not be messed up when a deployment's secret changed (from env var: #fromEnv) > Verify secrets page should not be messed up when a deployment's secret changed (from env var: true) PASSED SecretsTest STANDARD_OUT 06:01:50 | INFO | SecretsTest | SecretsTest | Ending testsuite 06:01:50 | INFO | SecretsTest | SecretsTest | Checking if cluster is healthy after test 06:01:50 | DEBUG | SecretsTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries VulnMgmtTest STANDARD_OUT 06:01:50 | INFO | VulnMgmtTest | VulnMgmtTest | Starting testsuite 06:02:13 | INFO | VulnMgmtTest | VulnMgmtTest | Ending testsuite 06:02:13 | INFO | VulnMgmtTest | VulnMgmtTest | Checking if cluster is healthy after test 06:02:13 | DEBUG | VulnMgmtTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries VulnReportingTest STANDARD_OUT 06:02:13 | INFO | VulnReportingTest | VulnReportingTest | Starting testsuite 06:02:13 | DEBUG | VulnReportingTest | OpenShift | Namespace qa already exists 06:02:13 | DEBUG | VulnReportingTest | Kubernetes | Told the orchestrator to createOrReplace maildev-05cd766d-7e30-40cc-ad05-df08861d42c9 06:02:13 | DEBUG | VulnReportingTest | Kubernetes | Waiting for maildev-05cd766d-7e30-40cc-ad05-df08861d42c9 to start 06:02:13 | DEBUG | VulnReportingTest | Kubernetes | Status of maildev-05cd766d-7e30-40cc-ad05-df08861d42c9's pods: 06:02:13 | DEBUG | VulnReportingTest | Kubernetes | - maildev-05cd766d-7e30-40cc-ad05-df08861d42c9-6b98896d99-nmfkk Container status: [] 06:02:13 | DEBUG | VulnReportingTest | Kubernetes | 0/1 are in the ready state for maildev-05cd766d-7e30-40cc-ad05-df08861d42c9 06:02:16 | DEBUG | VulnReportingTest | Kubernetes | Waiting for maildev-05cd766d-7e30-40cc-ad05-df08861d42c9 to start 06:02:16 | DEBUG | VulnReportingTest | Kubernetes | Status of maildev-05cd766d-7e30-40cc-ad05-df08861d42c9's pods: 06:02:16 | DEBUG | VulnReportingTest | Kubernetes | - maildev-05cd766d-7e30-40cc-ad05-df08861d42c9-6b98896d99-nmfkk Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:02:14Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:02:16 | DEBUG | VulnReportingTest | Kubernetes | All 1 replicas found in ready state for maildev-05cd766d-7e30-40cc-ad05-df08861d42c9 06:02:16 | DEBUG | VulnReportingTest | Kubernetes | Took 3 seconds for k8s deployment maildev-05cd766d-7e30-40cc-ad05-df08861d42c9 06:02:16 | DEBUG | VulnReportingTest | Kubernetes | Updating deployment maildev-05cd766d-7e30-40cc-ad05-df08861d42c9 with 1 pods 06:02:16 | DEBUG | VulnReportingTest | Kubernetes | maildev-smtp-05cd766d-7e30-40cc-ad05-df08861d42c9: Service created 06:02:16 | DEBUG | VulnReportingTest | Kubernetes | maildev-web-05cd766d-7e30-40cc-ad05-df08861d42c9: Service created 06:03:16 | INFO | VulnReportingTest | OpenShift | Created namespace qa-vulnreport-2nd-namespace 06:03:16 | INFO | VulnReportingTest | Kubernetes | Copy image pull secrets from the default service account in the test orchestration namespace (qa) for use by the default service account in qa-vulnreport-2nd-namespace namespace. 06:03:16 | DEBUG | VulnReportingTest | Kubernetes | quay: secret created. 06:03:16 | DEBUG | VulnReportingTest | Kubernetes | default-dockercfg-tkj7v: secret created. 06:03:17 | DEBUG | VulnReportingTest | Kubernetes | redhat-image-pull-secret: secret created. 06:03:17 | DEBUG | VulnReportingTest | Kubernetes | public-dockerhub: secret created. 06:03:17 | DEBUG | VulnReportingTest | Kubernetes | gcr-image-pull-secret: secret created. 06:03:17 | DEBUG | VulnReportingTest | OpenShift | Adding system:serviceaccount:qa-vulnreport-2nd-namespace:default to anyuid user list 06:03:17 | DEBUG | VulnReportingTest | OpenShift | Namespace qa already exists 06:03:17 | DEBUG | VulnReportingTest | Kubernetes | Told the orchestrator to createOrReplace struts-deployment 06:03:17 | DEBUG | VulnReportingTest | OpenShift | Namespace qa-vulnreport-2nd-namespace already exists 06:03:17 | DEBUG | VulnReportingTest | Kubernetes | Told the orchestrator to createOrReplace registry-deployment 06:03:17 | DEBUG | VulnReportingTest | Kubernetes | Waiting for struts-deployment to start 06:03:17 | DEBUG | VulnReportingTest | Kubernetes | Status of struts-deployment's pods: 06:03:17 | DEBUG | VulnReportingTest | Kubernetes | - struts-deployment-85f97b6d49-8rl67 Container status: [ContainerState(running=null, terminated=null, waiting=ContainerStateWaiting(message=null, reason=ContainerCreating, additionalProperties={}), additionalProperties={})] 06:03:17 | DEBUG | VulnReportingTest | Kubernetes | 0/1 are in the ready state for struts-deployment 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Waiting for struts-deployment to start 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Status of struts-deployment's pods: 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | - struts-deployment-85f97b6d49-8rl67 Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:03:17Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | All 1 replicas found in ready state for struts-deployment 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Took 3 seconds for k8s deployment struts-deployment 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Updating deployment struts-deployment with 1 pods 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Waiting for registry-deployment to start 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Status of registry-deployment's pods: 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | - registry-deployment-6557fc79fd-2xhjf Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:03:18Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | All 1 replicas found in ready state for registry-deployment 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Took 0 seconds for k8s deployment registry-deployment 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Updating deployment registry-deployment with 1 pods 06:03:20 | INFO | VulnReportingTest | Services | SR found deployment struts-deployment within 0s 06:03:20 | INFO | VulnReportingTest | Services | SR found deployment registry-deployment within 0s VulnReportingTest > Verify vulnerability generated using a collection sends an email with a valid report attachment SKIPPED VulnReportingTest STANDARD_OUT 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | maildev-smtp-05cd766d-7e30-40cc-ad05-df08861d42c9: Service deleting... 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | maildev-smtp-05cd766d-7e30-40cc-ad05-df08861d42c9: Service deleted 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | maildev-web-05cd766d-7e30-40cc-ad05-df08861d42c9: Service deleting... 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | maildev-web-05cd766d-7e30-40cc-ad05-df08861d42c9: Service deleted 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Waiting for service maildev-smtp-05cd766d-7e30-40cc-ad05-df08861d42c9 to be deleted 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | maildev-smtp-05cd766d-7e30-40cc-ad05-df08861d42c9: service removed. 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Waiting for service maildev-web-05cd766d-7e30-40cc-ad05-df08861d42c9 to be deleted 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | maildev-web-05cd766d-7e30-40cc-ad05-df08861d42c9: service removed. 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Removed the deployment: maildev-05cd766d-7e30-40cc-ad05-df08861d42c9 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Removed the deployment: struts-deployment 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Removed the deployment: registry-deployment 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Waiting for namespace qa-vulnreport-2nd-namespace to be deleted 06:03:20 | DEBUG | VulnReportingTest | Kubernetes | Retrying in 3... 06:03:23 | DEBUG | VulnReportingTest | Kubernetes | Retrying in 3... 06:03:26 | DEBUG | VulnReportingTest | Kubernetes | K8s found that namespace qa-vulnreport-2nd-namespace was deleted 06:03:26 | INFO | VulnReportingTest | VulnReportingTest | Ending testsuite 06:03:26 | INFO | VulnReportingTest | VulnReportingTest | Checking if cluster is healthy after test 06:03:26 | DEBUG | VulnReportingTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries VulnScanWithGraphQLTest STANDARD_OUT 06:03:26 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | Starting testsuite 06:03:26 | DEBUG | VulnScanWithGraphQLTest | OpenShift | Namespace qa already exists 06:03:26 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Told the orchestrator to createOrReplace qastruts 06:03:26 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Waiting for qastruts to start 06:03:26 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Status of qastruts's pods: 06:03:26 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | - qastruts-868b56784f-94kzs Container status: [] 06:03:26 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | 0/1 are in the ready state for qastruts 06:03:29 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Waiting for qastruts to start 06:03:29 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Status of qastruts's pods: 06:03:29 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | - qastruts-868b56784f-94kzs Container status: [ContainerState(running=ContainerStateRunning(startedAt=2025-11-27T06:03:27Z, additionalProperties={}), terminated=null, waiting=null, additionalProperties={})] 06:03:29 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | All 1 replicas found in ready state for qastruts 06:03:29 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Took 3 seconds for k8s deployment qastruts 06:03:29 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Updating deployment qastruts with 1 pods 06:03:29 | INFO | VulnScanWithGraphQLTest | Services | SR found deployment qastruts within 0s VulnScanWithGraphQLTest > Verify image vuln,cves,cvss on #depName in GraphQL > Verify image vuln,cves,cvss on qastruts in GraphQL STANDARD_OUT 06:03:29 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | Starting testcase: Verify image vuln,cves,cvss on qastruts in GraphQL 06:03:29 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | id 256d9951-3240-4f0b-b919-0c96ad3f5928 06:03:29 | DEBUG | VulnScanWithGraphQLTest | GraphQLService | GraphQL query: {"query":"query getDeployment($id: ID!) {\n deployment :\n deployment(id: $id) {\n images {\n scan\n {\n scanTime} id name {fullName}\n }\n }\n }\n","variables":{"id":"256d9951-3240-4f0b-b919-0c96ad3f5928"}} 06:03:30 | DEBUG | VulnScanWithGraphQLTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"deployment":{"images":[{"scan":{"scanTime":"2025-11-27T05:53:04.737699432Z"},"id":"sha256:3401cc09305901ed505ddfccf3e533dde3f7fe326958131ee653d4067ab32246","name":{"fullName":"quay.io/rhacs-eng/qa-multi-arch:struts-app"}}]}}} 06:03:30 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | code 200 06:03:30 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | img.name ...[fullName:quay.io/rhacs-eng/qa-multi-arch:struts-app] 06:03:30 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | imageID found using deployment query 06:03:30 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | image id ...sha256:3401cc09305901ed505ddfccf3e533dde3f7fe326958131ee653d4067ab32246 06:03:30 | DEBUG | VulnScanWithGraphQLTest | GraphQLService | GraphQL query: {"query":"\n query image($id: ID!) {\n image:\n image(id: $id) {\n //cve_info here\n id\n lastUpdated\n deployments {\n id\n name\n }\n name {\n fullName\n registry\n remote\n tag\n }\n scan {\n imageComponents {\n name\n layerIndex\n version\n license {\n name\n type\n url\n }\n imageVulnerabilities {\n cve\n cvss\n link\n summary\n }\n }\n }\n }\n }","variables":{"id":"sha256:3401cc09305901ed505ddfccf3e533dde3f7fe326958131ee653d4067ab32246"}} 06:03:30 | DEBUG | VulnScanWithGraphQLTest | GraphQLService | GraphQL response: HTTP/1.1 200 OK: {"data":{"image":{"id":"sha256:3401cc09305901ed505ddfccf3e533dde3f7fe326958131ee653d4067ab32246","lastUpdated":"2025-11-27T05:53:04.74281941Z","deployments":[{"id":"256d9951-3240-4f0b-b919-0c96ad3f5928","name":"qastruts"}],"name":{"fullName":"quay.io/rhacs-eng/qa-multi-arch:struts-app","registry":"quay.io","remote":"rhacs-eng/qa-multi-arch","tag":"struts-app"},"scan":{"imageComponents":[{"name":"acl","layerIndex":0,"version":"2.2.53-6","license":null,"imageVulnerabilities":[]},{"name":"adduser","layerIndex":0,"version":"3.118ubuntu2","license":null,"imageVulnerabilities":[]},{"name":"apr","layerIndex":17,"version":"1.6.5-1ubuntu1","license":null,"imageVulnerabilities":[{"cve":"CVE-2023-49582","cvss":5.5,"link":"https://ubuntu.com/security/CVE-2023-49582","summary":"Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data. This issue does not affect non-Unix platforms, or b... 06:03:30 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | return code 200 06:03:30 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | number of CVEs 251 06:03:30 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | Ending testcase VulnScanWithGraphQLTest > Verify image vuln,cves,cvss on #depName in GraphQL > Verify image vuln,cves,cvss on qastruts in GraphQL PASSED VulnScanWithGraphQLTest STANDARD_OUT 06:03:30 | DEBUG | VulnScanWithGraphQLTest | Kubernetes | Removed the deployment: qastruts 06:03:30 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | Ending testsuite 06:03:30 | INFO | VulnScanWithGraphQLTest | VulnScanWithGraphQLTest | Checking if cluster is healthy after test 06:03:30 | DEBUG | VulnScanWithGraphQLTest | Helpers | Calling BaseSpecification.waitForClusterHealthy with 30 retries 06:03:30 | INFO | | BaseSpecification | Performing global shutdown 06:03:30 | INFO | | RoleService | Deleted role: Test Automation Role - 18480 and permission set 06:03:30 | INFO | | BaseSpecification | Removing core image registry integration 06:03:30 | DEBUG | | ImageIntegrationService | Image integration deleted: c5e05c9d-3f61-44c9-bd9f-a9d862686bcd [Incubating] Problems report is available at: file:///go/src/github.com/stackrox/stackrox/qa-tests-backend/build/reports/problems/problems-report.html Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0. You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins. For more on this, please refer to https://docs.gradle.org/8.13/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation. BUILD SUCCESSFUL in 1h 29m 23s 15 actionable tasks: 3 executed, 12 up-to-date make: Leaving directory '/go/src/github.com/stackrox/stackrox/qa-tests-backend' INFO: Thu Nov 27 06:03:31 UTC 2025: Skipping the workload identity cleanup. INFO: Thu Nov 27 06:03:31 UTC 2025: Copying qa-tests-backend results to part-1-tests INFO: Thu Nov 27 06:03:31 UTC 2025: Copying test results from qa-tests-backend/build/test-results/testBegin to part-1-tests INFO: Thu Nov 27 06:03:31 UTC 2025: Copying test results from qa-tests-backend/build/test-results/testParallel to part-1-tests INFO: Thu Nov 27 06:03:31 UTC 2025: Copying test results from qa-tests-backend/build/test-results/testRest to part-1-tests **** **** 06:03:31: test completed [QA tests part I] **** **** **** 06:03:31: About to run post test [QA tests part I] **** 06:03:31: Running post command: ['scripts/ci/collect-collector-metrics.sh', 'stackrox', '/tmp/collector-metrics'] . set up port-forwarding from collector-46897:9090 to localhost:9090 finished download collector-46897.txt finished tear down of port-forwarding from collector-46897:9090 to localhost:9090 . set up port-forwarding from collector-btw8k:9090 to localhost:9090 finished download collector-btw8k.txt finished tear down of port-forwarding from collector-btw8k:9090 to localhost:9090 . set up port-forwarding from collector-f6grb:9090 to localhost:9090 finished download collector-f6grb.txt finished tear down of port-forwarding from collector-f6grb:9090 to localhost:9090 . set up port-forwarding from collector-gtt9f:9090 to localhost:9090 finished download collector-gtt9f.txt finished tear down of port-forwarding from collector-gtt9f:9090 to localhost:9090 . set up port-forwarding from collector-k2jf6:9090 to localhost:9090 finished download collector-k2jf6.txt finished tear down of port-forwarding from collector-k2jf6:9090 to localhost:9090 . set up port-forwarding from collector-vtrn9:9090 to localhost:9090 finished download collector-vtrn9.txt finished tear down of port-forwarding from collector-vtrn9:9090 to localhost:9090 06:04:01: Running post command: ['tests/e2e/lib.sh', 'wait_for_api'] INFO: Thu Nov 27 06:04:02 UTC 2025: Waiting for Central to be ready in namespace stackrox INFO: Thu Nov 27 06:04:02 UTC 2025: Waiting 600s (increased for openshift-ci provisioned clusters) for central api and 3600 for ingress... INFO: Thu Nov 27 06:04:02 UTC 2025: Waiting for deployment central to be ready in namespace stackrox INFO: Thu Nov 27 06:04:12 UTC 2025: Deployment central is ready in namespace stackrox. INFO: Thu Nov 27 06:04:12 UTC 2025: Central deployment is ready in namespace stackrox. INFO: Thu Nov 27 06:04:12 UTC 2025: Waiting for Central API endpoint INFO: Thu Nov 27 06:04:12 UTC 2025: Found ingress endpoint: af73e1c2a9ec5411aa21d0cf3a95de57-2001228783.XXXXXXXXX.elb.amazonaws.com INFO: Thu Nov 27 06:04:12 UTC 2025: Attempting to get 6 'ok' responses in a row from https://af73e1c2a9ec5411aa21d0cf3a95de57-2001228783.XXXXXXXXX.elb.amazonaws.com:443/v1/ping INFO: Thu Nov 27 06:04:12 UTC 2025: Status is now: ok INFO: Thu Nov 27 06:04:14 UTC 2025: Status is now: ok INFO: Thu Nov 27 06:04:16 UTC 2025: Status is now: ok INFO: Thu Nov 27 06:04:18 UTC 2025: Status is now: ok INFO: Thu Nov 27 06:04:20 UTC 2025: Status is now: ok 06:04:22: Running post command: ['scripts/ci/lib.sh', 'get_central_debug_dump', 'debug-dump'] INFO: Thu Nov 27 06:04:22 UTC 2025: Getting a central debug dump INFO: Retrieving debug metrics. This may take a couple of minutes... INFO: Successfully wrote debug zip file to "debug-dump/stackrox_debug_2025_11_27_06_04_22.zip" total 820 -rw-r--r--. 1 1002430000 root 836145 Nov 27 06:04 stackrox_debug_2025_11_27_06_04_22.zip 06:04:52: Running post command: ['scripts/ci/lib.sh', 'process_central_metrics', 'debug-dump'] INFO: Thu Nov 27 06:04:52 UTC 2025: Processing metrics from central debug dump go: downloading github.com/stackrox/prometheus-metric-parser v0.0.0-20240718111853-be492d554cd5 go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20240610135401-a8a62080eff3 go: downloading github.com/spf13/cobra v1.8.0 go: downloading cloud.google.com/go/monitoring v1.19.0 go: downloading golang.org/x/exp v0.0.0-20240604190554-fc45aab8b7f8 go: downloading github.com/prometheus/prom2json v1.3.3 go: downloading google.golang.org/protobuf v1.34.2 go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.4 go: downloading github.com/prometheus/common v0.54.0 go: downloading github.com/spf13/pflag v1.0.5 go: downloading google.golang.org/genproto v0.0.0-20240610135401-a8a62080eff3 go: downloading github.com/golang/protobuf v1.5.4 go: downloading google.golang.org/grpc v1.64.1 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20240610135401-a8a62080eff3 go: downloading github.com/googleapis/gax-go/v2 v2.12.4 go: downloading google.golang.org/api v0.183.0 go: downloading cloud.google.com/go/compute/metadata v0.3.0 go: downloading golang.org/x/time v0.5.0 go: downloading go.opencensus.io v0.24.0 go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.52.0 go: downloading github.com/google/s2a-go v0.1.7 go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.2 go: downloading cloud.google.com/go/auth v0.5.1 go: downloading github.com/googleapis/enterprise-certificate-proxy v0.3.2 go: downloading go.opentelemetry.io/otel v1.27.0 go: downloading go.opentelemetry.io/otel/metric v1.27.0 go: downloading go.opentelemetry.io/otel/trace v1.27.0 go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da go: downloading github.com/go-logr/logr v1.4.2 Usage: prometheus-metric-parser [command] Available Commands: compare Compare takes two metrics files and compares them takes all the metrics and outputs them as key value pairs. It will average histograms completion Generate the autocompletion script for the specified shell help Help about any command single Single takes all the metrics and outputs them as key value pairs. It will average histograms Flags: -h, --help help for prometheus-metric-parser Use "prometheus-metric-parser [command] --help" for more information about a command. INFO: Thu Nov 27 06:05:02 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json INFO: Thu Nov 27 06:05:02 UTC 2025: Saving Big Query test records from /tmp/tmp.q4Yk5B2WQf.csv to gs://stackrox-ci-artifacts/central-metrics/upload Copying file:///tmp/tmp.q4Yk5B2WQf.csv to gs://stackrox-ci-artifacts/central-metrics/upload/tmp.q4Yk5B2WQf.csv .. 06:05:04: Running post command: ['scripts/ci/lib.sh', 'get_central_diagnostics', 'diagnostic-bundle'] INFO: Thu Nov 27 06:05:04 UTC 2025: Getting central diagnostics INFO: Downloading diagnostic bundle... INFO: Successfully wrote diagnostic zip file to "diagnostic-bundle/stackrox_diagnostic_2025_11_27_06_05_04.zip" total 1964 -rw-r--r--. 1 1002430000 root 2008116 Nov 27 06:05 stackrox_diagnostic_2025_11_27_06_05_04.zip 06:05:25: Running post command: ['scripts/grab-data-from-central.sh', 'central-data'] 0.0 b [>>------------------------------------------------] 0.0 b/s central-data/postgres_db_2025_11_27_06_05_25.sql.zip 15.2 MiB [>>>------------------------------------------] 4.2 MiB/s central-data/postgres_db_2025_11_27_06_05_25.sql.zip Wrote backup file to "central-data/postgres_db_2025_11_27_06_05_25.sql.zip" Pulling StackRox policies Will pull 87 policies from StackRox 06:05:35: Running post command: ['scripts/ci/collect-service-logs.sh', 'stackrox', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE stackrox Active 97m INFO: Thu Nov 27 06:05:35 UTC 2025: >>> Collecting from namespace stackrox <<< INFO: Thu Nov 27 06:05:35 UTC 2025: >>> Collecting daemonsets from namespace stackrox <<< NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR collector 6 6 6 6 6 96m collector,compliance,node-inventory quay.io/rhacs-eng/collector:3.23.x-43-gd759b32efb,quay.io/rhacs-eng/main:4.10.x-442-g3e9694559e,quay.io/rhacs-eng/scanner-slim:2.38.x-24-gcd5fb7a6d1 service=collector INFO: Thu Nov 27 06:05:36 UTC 2025: >>> Collecting deployments from namespace stackrox <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR admission-control 3/3 3 3 96m admission-control quay.io/rhacs-eng/main:4.10.x-442-g3e9694559e app=admission-control central 1/1 1 1 97m central quay.io/rhacs-eng/main:4.10.x-442-g3e9694559e app=central central-db 1/1 1 1 97m central-db quay.io/rhacs-eng/central-db:4.10.x-442-g3e9694559e app=central-db config-controller 0/1 1 0 97m manager quay.io/rhacs-eng/main:4.10.x-442-g3e9694559e app=config-controller scanner 1/1 1 1 97m scanner quay.io/rhacs-eng/scanner:2.38.x-24-gcd5fb7a6d1 app=scanner scanner-db 1/1 1 1 97m db quay.io/rhacs-eng/scanner-db:2.38.x-24-gcd5fb7a6d1 app=scanner-db sensor 1/1 1 1 96m sensor quay.io/rhacs-eng/main:4.10.x-442-g3e9694559e app=sensor webhookserver 1/1 1 1 95m webhookserver quay.io/rhacs-eng/qa-multi-arch:webhookserver-1.2 app=webhookserver INFO: Thu Nov 27 06:05:41 UTC 2025: >>> Collecting services from namespace stackrox <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR admission-control ClusterIP 172.30.193.96 443/TCP 96m app=admission-control central ClusterIP 172.30.162.206 443/TCP,9091/TCP 97m app=central central-db ClusterIP 172.30.247.100 5432/TCP 97m app=central-db central-loadbalancer LoadBalancer 172.30.158.146 af73e1c2a9ec5411aa21d0cf3a95de57-2001228783.XXXXXXXXX.elb.amazonaws.com 443:30812/TCP 97m app=central scanner ClusterIP 172.30.164.19 8080/TCP,8443/TCP 97m app=scanner scanner-db ClusterIP 172.30.187.72 5432/TCP 97m app=scanner-db sensor ClusterIP 172.30.203.238 443/TCP,9091/TCP 96m app=sensor sensor-webhook ClusterIP 172.30.109.108 443/TCP 96m app=sensor webhookserver ClusterIP 172.30.19.244 8080/TCP,8443/TCP 95m app=webhookserver INFO: Thu Nov 27 06:05:46 UTC 2025: >>> Collecting pods from namespace stackrox <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES admission-control-d77f6dd-2qv6g 1/1 Running 0 88m 10.129.2.24 ip-10-0-16-184.ec2.internal admission-control-d77f6dd-h8p6k 1/1 Running 0 88m 10.128.2.56 ip-10-0-32-248.ec2.internal admission-control-d77f6dd-sn2ts 1/1 Running 0 88m 10.131.0.37 ip-10-0-122-153.ec2.internal central-675967bb95-7rkvx 1/1 Running 0 97m 10.131.0.25 ip-10-0-122-153.ec2.internal central-db-67998db698-txx99 1/1 Running 0 97m 10.129.2.14 ip-10-0-16-184.ec2.internal collector-46897 3/3 Running 0 95m 10.128.0.101 ip-10-0-97-71.ec2.internal collector-btw8k 3/3 Running 0 95m 10.128.2.32 ip-10-0-32-248.ec2.internal collector-f6grb 3/3 Running 0 95m 10.131.0.28 ip-10-0-122-153.ec2.internal collector-gtt9f 3/3 Running 0 95m 10.129.0.72 ip-10-0-4-174.ec2.internal collector-k2jf6 3/3 Running 0 95m 10.129.2.18 ip-10-0-16-184.ec2.internal collector-vtrn9 3/3 Running 0 95m 10.130.0.88 ip-10-0-2-27.ec2.internal config-controller-6d7c65f6b8-c8jh2 0/1 Running 5 (12m ago) 97m 10.128.2.27 ip-10-0-32-248.ec2.internal scanner-c854f7f8c-jdw9n 1/1 Running 0 97m 10.128.2.28 ip-10-0-32-248.ec2.internal scanner-db-dd9d94d69-tkm8n 1/1 Running 0 97m 10.128.2.26 ip-10-0-32-248.ec2.internal sensor-6d955c5b7c-llmc9 1/1 Running 0 96m 10.129.2.16 ip-10-0-16-184.ec2.internal webhookserver-84f798856c-jjr55 1/1 Running 0 95m 10.128.2.33 ip-10-0-32-248.ec2.internal INFO: Thu Nov 27 06:05:47 UTC 2025: Dumping log of pods/admission-control-d77f6dd-2qv6g current container admission-control in stackrox... INFO: Thu Nov 27 06:05:48 UTC 2025: Dumping log of pods/admission-control-d77f6dd-2qv6g current container init-tls-certs in stackrox... INFO: Thu Nov 27 06:05:48 UTC 2025: Dumping log of pods/admission-control-d77f6dd-h8p6k current container admission-control in stackrox... INFO: Thu Nov 27 06:05:49 UTC 2025: Dumping log of pods/admission-control-d77f6dd-h8p6k current container init-tls-certs in stackrox... INFO: Thu Nov 27 06:05:49 UTC 2025: Dumping log of pods/admission-control-d77f6dd-sn2ts current container admission-control in stackrox... INFO: Thu Nov 27 06:05:50 UTC 2025: Dumping log of pods/admission-control-d77f6dd-sn2ts current container init-tls-certs in stackrox... INFO: Thu Nov 27 06:05:51 UTC 2025: Dumping log of pods/central-675967bb95-7rkvx current container central in stackrox... INFO: Thu Nov 27 06:05:51 UTC 2025: Dumping log of pods/central-db-67998db698-txx99 current container central-db in stackrox... INFO: Thu Nov 27 06:05:52 UTC 2025: Dumping log of pods/central-db-67998db698-txx99 current container init-db in stackrox... INFO: Thu Nov 27 06:05:53 UTC 2025: Dumping log of pods/collector-46897 current container collector in stackrox... INFO: Thu Nov 27 06:05:53 UTC 2025: Dumping log of pods/collector-46897 current container compliance in stackrox... INFO: Thu Nov 27 06:05:53 UTC 2025: Dumping log of pods/collector-46897 current container node-inventory in stackrox... INFO: Thu Nov 27 06:05:53 UTC 2025: Dumping log of pods/collector-46897 current container init-tls-certs in stackrox... INFO: Thu Nov 27 06:05:54 UTC 2025: Dumping log of pods/collector-btw8k current container collector in stackrox... INFO: Thu Nov 27 06:05:54 UTC 2025: Dumping log of pods/collector-btw8k current container compliance in stackrox... INFO: Thu Nov 27 06:05:55 UTC 2025: Dumping log of pods/collector-btw8k current container node-inventory in stackrox... INFO: Thu Nov 27 06:05:55 UTC 2025: Dumping log of pods/collector-btw8k current container init-tls-certs in stackrox... INFO: Thu Nov 27 06:05:56 UTC 2025: Dumping log of pods/collector-f6grb current container collector in stackrox... INFO: Thu Nov 27 06:05:56 UTC 2025: Dumping log of pods/collector-f6grb current container compliance in stackrox... INFO: Thu Nov 27 06:05:56 UTC 2025: Dumping log of pods/collector-f6grb current container node-inventory in stackrox... INFO: Thu Nov 27 06:05:57 UTC 2025: Dumping log of pods/collector-f6grb current container init-tls-certs in stackrox... INFO: Thu Nov 27 06:05:57 UTC 2025: Dumping log of pods/collector-gtt9f current container collector in stackrox... INFO: Thu Nov 27 06:05:58 UTC 2025: Dumping log of pods/collector-gtt9f current container compliance in stackrox... INFO: Thu Nov 27 06:05:58 UTC 2025: Dumping log of pods/collector-gtt9f current container node-inventory in stackrox... INFO: Thu Nov 27 06:05:58 UTC 2025: Dumping log of pods/collector-gtt9f current container init-tls-certs in stackrox... INFO: Thu Nov 27 06:05:59 UTC 2025: Dumping log of pods/collector-k2jf6 current container collector in stackrox... INFO: Thu Nov 27 06:05:59 UTC 2025: Dumping log of pods/collector-k2jf6 current container compliance in stackrox... INFO: Thu Nov 27 06:05:59 UTC 2025: Dumping log of pods/collector-k2jf6 current container node-inventory in stackrox... INFO: Thu Nov 27 06:06:00 UTC 2025: Dumping log of pods/collector-k2jf6 current container init-tls-certs in stackrox... INFO: Thu Nov 27 06:06:00 UTC 2025: Dumping log of pods/collector-vtrn9 current container collector in stackrox... INFO: Thu Nov 27 06:06:01 UTC 2025: Dumping log of pods/collector-vtrn9 current container compliance in stackrox... INFO: Thu Nov 27 06:06:01 UTC 2025: Dumping log of pods/collector-vtrn9 current container node-inventory in stackrox... INFO: Thu Nov 27 06:06:01 UTC 2025: Dumping log of pods/collector-vtrn9 current container init-tls-certs in stackrox... INFO: Thu Nov 27 06:06:02 UTC 2025: Dumping log of pods/config-controller-6d7c65f6b8-c8jh2 current container manager in stackrox... INFO: Thu Nov 27 06:06:02 UTC 2025: Dumping log of pods/config-controller-6d7c65f6b8-c8jh2 previous container manager in stackrox... INFO: Thu Nov 27 06:06:03 UTC 2025: Dumping log of pods/scanner-c854f7f8c-jdw9n current container scanner in stackrox... INFO: Thu Nov 27 06:06:04 UTC 2025: Dumping log of pods/scanner-db-dd9d94d69-tkm8n current container db in stackrox... INFO: Thu Nov 27 06:06:04 UTC 2025: Dumping log of pods/scanner-db-dd9d94d69-tkm8n current container init-db in stackrox... INFO: Thu Nov 27 06:06:05 UTC 2025: Dumping log of pods/sensor-6d955c5b7c-llmc9 current container sensor in stackrox... INFO: Thu Nov 27 06:06:05 UTC 2025: Dumping log of pods/sensor-6d955c5b7c-llmc9 current container crs in stackrox... INFO: Thu Nov 27 06:06:06 UTC 2025: Dumping log of pods/sensor-6d955c5b7c-llmc9 current container init-tls-certs in stackrox... INFO: Thu Nov 27 06:06:06 UTC 2025: Dumping log of pods/webhookserver-84f798856c-jjr55 current container webhookserver in stackrox... INFO: Thu Nov 27 06:06:07 UTC 2025: >>> Collecting secrets from namespace stackrox <<< NAME TYPE DATA AGE admission-control-dockercfg-gr2x7 kubernetes.io/dockercfg 1 96m admission-control-tls Opaque 3 96m builder-dockercfg-4lnrx kubernetes.io/dockercfg 1 98m central-admin-pass Opaque 1 98m central-db-dockercfg-jcm57 kubernetes.io/dockercfg 1 98m central-db-password Opaque 1 98m central-db-tls Opaque 3 98m central-default-tls-secret kubernetes.io/tls 2 98m central-dockercfg-9jb8p kubernetes.io/dockercfg 1 98m central-htpasswd Opaque 1 98m central-monitoring-tls kubernetes.io/tls 2 98m central-stackrox-central-services-proxy-env Opaque 1 98m central-tls Opaque 5 98m collector-dockercfg-2wg5p kubernetes.io/dockercfg 1 96m collector-tls Opaque 3 96m config-controller-dockercfg-r5r79 kubernetes.io/dockercfg 1 98m default-dockercfg-dn45g kubernetes.io/dockercfg 1 98m deployer-dockercfg-zvd75 kubernetes.io/dockercfg 1 98m helm-cluster-config Opaque 1 96m scanner-db-password Opaque 1 98m scanner-db-tls Opaque 3 98m scanner-dockercfg-66ldk kubernetes.io/dockercfg 1 98m scanner-tls Opaque 3 98m securedcluster-stackrox-secured-cluster-services-proxy-env Opaque 1 96m sensor-dockercfg-qslph kubernetes.io/dockercfg 1 96m sensor-monitoring-tls kubernetes.io/tls 2 96m sensor-tls Opaque 3 96m service-ca Opaque 1 96m sh.helm.release.v1.stackrox-central-services.v1 helm.sh/release.v1 1 98m sh.helm.release.v1.stackrox-secured-cluster-services.v1 helm.sh/release.v1 1 96m sh.helm.release.v1.webhookserver.v1 helm.sh/release.v1 1 95m stackrox kubernetes.io/dockerconfigjson 1 98m tls-cert-admission-control Opaque 3 96m tls-cert-collector Opaque 3 96m tls-cert-scanner Opaque 3 96m tls-cert-scanner-db Opaque 3 96m tls-cert-scanner-v4-db Opaque 3 96m tls-cert-scanner-v4-indexer Opaque 3 96m tls-cert-sensor Opaque 3 96m webhook-server-certs Opaque 2 95m INFO: Thu Nov 27 06:06:28 UTC 2025: >>> Collecting serviceaccounts from namespace stackrox <<< NAME SECRETS AGE admission-control 1 97m builder 1 98m central 1 98m central-db 1 98m collector 1 97m config-controller 1 98m default 1 98m deployer 1 98m scanner 1 98m sensor 1 97m INFO: Thu Nov 27 06:06:34 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace stackrox <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 129m autoscaling.openshift.io 2 134m cluster-baremetal-validating-webhook-configuration 1 134m controlplanemachineset.machine.openshift.io 1 133m machine-api 2 134m monitoringconfigmaps.openshift.io 1 116m multus.openshift.io 1 136m network-node-identity.openshift.io 2 123m performance-addon-operator 1 139m prometheusrules.openshift.io 1 129m stackrox 2 97m INFO: Thu Nov 27 06:06:41 UTC 2025: >>> Collecting catalogsources from namespace stackrox <<< No resources found in stackrox namespace. INFO: Thu Nov 27 06:06:41 UTC 2025: >>> Collecting subscriptions from namespace stackrox <<< No resources found in stackrox namespace. INFO: Thu Nov 27 06:06:42 UTC 2025: >>> Collecting clusterserviceversions from namespace stackrox <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-442-g3e9694559e Advanced Cluster Security for Kubernetes 4.10.0-442-g3e9694559e rhacs-operator.v4.9.0 Succeeded INFO: Thu Nov 27 06:06:43 UTC 2025: >>> Collecting central from namespace stackrox <<< NAME VERSION ADMINPASSWORD MESSAGE stackrox-central-services 4.10.x-442-g3e9694559e central-admin-pass INFO: Thu Nov 27 06:06:43 UTC 2025: >>> Collecting securedclusters from namespace stackrox <<< NAME AGE stackrox-secured-cluster-services 97m INFO: Thu Nov 27 06:06:44 UTC 2025: >>> Collecting nodes from namespace stackrox <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-122-153.ec2.internal Ready worker 130m v1.34.1 10.0.122.153 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-16-184.ec2.internal Ready worker 123m v1.34.1 10.0.16.184 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-2-27.ec2.internal Ready control-plane,master 135m v1.34.1 10.0.2.27 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-32-248.ec2.internal Ready worker 130m v1.34.1 10.0.32.248 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-4-174.ec2.internal Ready control-plane,master 135m v1.34.1 10.0.4.174 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-97-71.ec2.internal Ready control-plane,master 137m v1.34.1 10.0.97.71 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:06:50: Running post command: ['scripts/ci/collect-service-logs.sh', 'stackrox-operator', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE stackrox-operator Active 99m INFO: Thu Nov 27 06:06:50 UTC 2025: >>> Collecting from namespace stackrox-operator <<< INFO: Thu Nov 27 06:06:50 UTC 2025: >>> Collecting daemonsets from namespace stackrox-operator <<< No resources found in stackrox-operator namespace. INFO: Thu Nov 27 06:06:50 UTC 2025: >>> Collecting deployments from namespace stackrox-operator <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR rhacs-operator-controller-manager 1/1 1 1 99m manager quay.io/rhacs-eng/stackrox-operator:4.10.0-442-g3e9694559e app=rhacs-operator,control-plane=controller-manager INFO: Thu Nov 27 06:06:51 UTC 2025: >>> Collecting services from namespace stackrox-operator <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR rhacs-operator-controller-manager-metrics-service ClusterIP 172.30.89.118 8443/TCP 99m app=rhacs-operator,control-plane=controller-manager stackrox-operator-test-index ClusterIP 172.30.70.95 50051/TCP 99m olm.catalogSource=stackrox-operator-test-index,olm.managed=true INFO: Thu Nov 27 06:06:52 UTC 2025: >>> Collecting pods from namespace stackrox-operator <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES 2d37771064b7eff82d479204d0da22c78d0e6f703001cda4886c85f454lz59c 0/1 Completed 0 99m 10.128.2.24 ip-10-0-32-248.ec2.internal rhacs-operator-controller-manager-6647c56f86-wf2mk 1/1 Running 0 99m 10.128.2.25 ip-10-0-32-248.ec2.internal stackrox-operator-test-index-95jpb 1/1 Running 0 99m 10.128.2.23 ip-10-0-32-248.ec2.internal INFO: Thu Nov 27 06:06:53 UTC 2025: Dumping log of pods/2d37771064b7eff82d479204d0da22c78d0e6f703001cda4886c85f454lz59c current container extract in stackrox-operator... INFO: Thu Nov 27 06:06:54 UTC 2025: Dumping log of pods/2d37771064b7eff82d479204d0da22c78d0e6f703001cda4886c85f454lz59c current container util in stackrox-operator... INFO: Thu Nov 27 06:06:54 UTC 2025: Dumping log of pods/2d37771064b7eff82d479204d0da22c78d0e6f703001cda4886c85f454lz59c current container pull in stackrox-operator... INFO: Thu Nov 27 06:06:54 UTC 2025: Dumping log of pods/rhacs-operator-controller-manager-6647c56f86-wf2mk current container manager in stackrox-operator... INFO: Thu Nov 27 06:06:55 UTC 2025: Dumping log of pods/stackrox-operator-test-index-95jpb current container registry-server in stackrox-operator... INFO: Thu Nov 27 06:06:56 UTC 2025: >>> Collecting secrets from namespace stackrox-operator <<< NAME TYPE DATA AGE builder-dockercfg-54v59 kubernetes.io/dockercfg 1 100m default-dockercfg-szgs9 kubernetes.io/dockercfg 1 100m deployer-dockercfg-8jdrg kubernetes.io/dockercfg 1 100m rhacs-operator-controller-manager-dockercfg-7h4sl kubernetes.io/dockercfg 1 99m stackrox-operator-test-index-dockercfg-g2v28 kubernetes.io/dockercfg 1 99m INFO: Thu Nov 27 06:06:58 UTC 2025: >>> Collecting serviceaccounts from namespace stackrox-operator <<< NAME SECRETS AGE builder 1 100m default 1 100m deployer 1 100m rhacs-operator-controller-manager 1 99m stackrox-operator-test-index 1 100m INFO: Thu Nov 27 06:07:01 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace stackrox-operator <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 130m autoscaling.openshift.io 2 134m cluster-baremetal-validating-webhook-configuration 1 134m controlplanemachineset.machine.openshift.io 1 133m machine-api 2 134m monitoringconfigmaps.openshift.io 1 117m multus.openshift.io 1 136m network-node-identity.openshift.io 2 123m performance-addon-operator 1 139m prometheusrules.openshift.io 1 130m stackrox 2 97m INFO: Thu Nov 27 06:07:08 UTC 2025: >>> Collecting catalogsources from namespace stackrox-operator <<< NAME DISPLAY TYPE PUBLISHER AGE stackrox-operator-test-index StackRox Operator Test index grpc 100m INFO: Thu Nov 27 06:07:09 UTC 2025: >>> Collecting subscriptions from namespace stackrox-operator <<< NAME PACKAGE SOURCE CHANNEL stackrox-operator-test-subscription rhacs-operator stackrox-operator-test-index latest INFO: Thu Nov 27 06:07:10 UTC 2025: >>> Collecting clusterserviceversions from namespace stackrox-operator <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-442-g3e9694559e Advanced Cluster Security for Kubernetes 4.10.0-442-g3e9694559e rhacs-operator.v4.9.0 Succeeded INFO: Thu Nov 27 06:07:11 UTC 2025: >>> Collecting central from namespace stackrox-operator <<< No resources found in stackrox-operator namespace. INFO: Thu Nov 27 06:07:11 UTC 2025: >>> Collecting securedclusters from namespace stackrox-operator <<< No resources found in stackrox-operator namespace. INFO: Thu Nov 27 06:07:11 UTC 2025: >>> Collecting nodes from namespace stackrox-operator <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-122-153.ec2.internal Ready worker 131m v1.34.1 10.0.122.153 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-16-184.ec2.internal Ready worker 124m v1.34.1 10.0.16.184 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-2-27.ec2.internal Ready control-plane,master 135m v1.34.1 10.0.2.27 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-32-248.ec2.internal Ready worker 130m v1.34.1 10.0.32.248 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-4-174.ec2.internal Ready control-plane,master 136m v1.34.1 10.0.4.174 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-97-71.ec2.internal Ready control-plane,master 137m v1.34.1 10.0.97.71 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:07:17: Running post command: ['scripts/ci/collect-service-logs.sh', 'proxies', '/tmp/k8s-service-logs/part-1/k8s-logs'] Error from server (NotFound): namespaces "proxies" not found INFO: Thu Nov 27 06:07:17 UTC 2025: Skipping missing namespace proxies 06:07:17: Running post command: ['scripts/ci/collect-service-logs.sh', 'squid', '/tmp/k8s-service-logs/part-1/k8s-logs'] Error from server (NotFound): namespaces "squid" not found INFO: Thu Nov 27 06:07:17 UTC 2025: Skipping missing namespace squid 06:07:17: Running post command: ['scripts/ci/collect-service-logs.sh', 'kube-system', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE kube-system Active 142m INFO: Thu Nov 27 06:07:17 UTC 2025: >>> Collecting from namespace kube-system <<< INFO: Thu Nov 27 06:07:17 UTC 2025: >>> Collecting daemonsets from namespace kube-system <<< No resources found in kube-system namespace. INFO: Thu Nov 27 06:07:18 UTC 2025: >>> Collecting deployments from namespace kube-system <<< No resources found in kube-system namespace. INFO: Thu Nov 27 06:07:18 UTC 2025: >>> Collecting services from namespace kube-system <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR kubelet ClusterIP None 10250/TCP,10255/TCP,4194/TCP 130m INFO: Thu Nov 27 06:07:19 UTC 2025: >>> Collecting pods from namespace kube-system <<< No resources found in kube-system namespace. INFO: Thu Nov 27 06:07:19 UTC 2025: >>> Collecting secrets from namespace kube-system <<< NAME TYPE DATA AGE attachdetach-controller-dockercfg-9nvsh kubernetes.io/dockercfg 1 124m aws-cloud-provider-dockercfg-dqp7x kubernetes.io/dockercfg 1 124m aws-creds Opaque 2 141m builder-dockercfg-nz9k8 kubernetes.io/dockercfg 1 123m certificate-controller-dockercfg-k6wn2 kubernetes.io/dockercfg 1 124m cloud-controller-manager-dockercfg-npz2l kubernetes.io/dockercfg 1 124m clusterrole-aggregation-controller-dockercfg-tfvvr kubernetes.io/dockercfg 1 124m cronjob-controller-dockercfg-v6d67 kubernetes.io/dockercfg 1 124m daemon-set-controller-dockercfg-7ml47 kubernetes.io/dockercfg 1 124m default-dockercfg-9n86t kubernetes.io/dockercfg 1 124m deployer-dockercfg-446rd kubernetes.io/dockercfg 1 123m deployment-controller-dockercfg-df5w7 kubernetes.io/dockercfg 1 123m disruption-controller-dockercfg-g6659 kubernetes.io/dockercfg 1 124m endpoint-controller-dockercfg-rv8tx kubernetes.io/dockercfg 1 123m endpointslice-controller-dockercfg-744ld kubernetes.io/dockercfg 1 123m endpointslicemirroring-controller-dockercfg-p9bdv kubernetes.io/dockercfg 1 123m ephemeral-volume-controller-dockercfg-vb5pd kubernetes.io/dockercfg 1 123m expand-controller-dockercfg-7czz7 kubernetes.io/dockercfg 1 123m generic-garbage-collector-dockercfg-xwqkl kubernetes.io/dockercfg 1 123m horizontal-pod-autoscaler-dockercfg-744r7 kubernetes.io/dockercfg 1 123m job-controller-dockercfg-sfvbt kubernetes.io/dockercfg 1 123m kube-cloud-cfg Opaque 1 141m kubeadmin Opaque 1 141m legacy-service-account-token-cleaner-dockercfg-mxqt4 kubernetes.io/dockercfg 1 123m namespace-controller-dockercfg-9zbws kubernetes.io/dockercfg 1 123m node-controller-dockercfg-8brcb kubernetes.io/dockercfg 1 123m persistent-volume-binder-dockercfg-mnh84 kubernetes.io/dockercfg 1 123m pod-garbage-collector-dockercfg-6gq9k kubernetes.io/dockercfg 1 123m pv-protection-controller-dockercfg-52whk kubernetes.io/dockercfg 1 123m pvc-protection-controller-dockercfg-8swbg kubernetes.io/dockercfg 1 123m replicaset-controller-dockercfg-rw76l kubernetes.io/dockercfg 1 123m replication-controller-dockercfg-tbv28 kubernetes.io/dockercfg 1 123m resourcequota-controller-dockercfg-wr22x kubernetes.io/dockercfg 1 123m root-ca-cert-publisher-dockercfg-48j54 kubernetes.io/dockercfg 1 123m selinux-warning-controller-dockercfg-b5kqm kubernetes.io/dockercfg 1 123m service-account-controller-dockercfg-bc6m2 kubernetes.io/dockercfg 1 123m service-ca-cert-publisher-dockercfg-l2488 kubernetes.io/dockercfg 1 123m service-cidrs-controller-dockercfg-c8zz8 kubernetes.io/dockercfg 1 123m service-controller-dockercfg-7ssf8 kubernetes.io/dockercfg 1 123m statefulset-controller-dockercfg-2gxhx kubernetes.io/dockercfg 1 123m ttl-after-finished-controller-dockercfg-5qlkr kubernetes.io/dockercfg 1 123m validatingadmissionpolicy-status-controller-dockercfg-xxv49 kubernetes.io/dockercfg 1 123m volumeattributesclass-protection-controller-dockercfg-wj8rz kubernetes.io/dockercfg 1 123m INFO: Thu Nov 27 06:07:41 UTC 2025: >>> Collecting serviceaccounts from namespace kube-system <<< NAME SECRETS AGE attachdetach-controller 1 142m aws-cloud-provider 1 138m builder 1 124m certificate-controller 1 142m cloud-controller-manager 1 139m clusterrole-aggregation-controller 1 142m cronjob-controller 1 142m daemon-set-controller 1 142m default 1 142m deployer 1 124m deployment-controller 1 142m disruption-controller 1 142m endpoint-controller 1 142m endpointslice-controller 1 142m endpointslicemirroring-controller 1 142m ephemeral-volume-controller 1 142m expand-controller 1 142m generic-garbage-collector 1 142m horizontal-pod-autoscaler 1 142m job-controller 1 142m legacy-service-account-token-cleaner 1 142m namespace-controller 1 142m node-controller 1 142m persistent-volume-binder 1 142m pod-garbage-collector 1 142m pv-protection-controller 1 142m pvc-protection-controller 1 142m replicaset-controller 1 142m replication-controller 1 142m resourcequota-controller 1 142m root-ca-cert-publisher 1 142m selinux-warning-controller 1 142m service-account-controller 1 142m service-ca-cert-publisher 1 142m service-cidrs-controller 1 142m service-controller 1 138m statefulset-controller 1 142m ttl-after-finished-controller 1 142m validatingadmissionpolicy-status-controller 1 142m volumeattributesclass-protection-controller 1 142m INFO: Thu Nov 27 06:08:04 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace kube-system <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 131m autoscaling.openshift.io 2 135m cluster-baremetal-validating-webhook-configuration 1 135m controlplanemachineset.machine.openshift.io 1 134m machine-api 2 135m monitoringconfigmaps.openshift.io 1 118m multus.openshift.io 1 137m network-node-identity.openshift.io 2 124m performance-addon-operator 1 140m prometheusrules.openshift.io 1 131m stackrox 2 98m INFO: Thu Nov 27 06:08:11 UTC 2025: >>> Collecting catalogsources from namespace kube-system <<< No resources found in kube-system namespace. INFO: Thu Nov 27 06:08:11 UTC 2025: >>> Collecting subscriptions from namespace kube-system <<< No resources found in kube-system namespace. INFO: Thu Nov 27 06:08:11 UTC 2025: >>> Collecting clusterserviceversions from namespace kube-system <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-442-g3e9694559e Advanced Cluster Security for Kubernetes 4.10.0-442-g3e9694559e rhacs-operator.v4.9.0 Succeeded INFO: Thu Nov 27 06:08:12 UTC 2025: >>> Collecting central from namespace kube-system <<< No resources found in kube-system namespace. INFO: Thu Nov 27 06:08:13 UTC 2025: >>> Collecting securedclusters from namespace kube-system <<< No resources found in kube-system namespace. INFO: Thu Nov 27 06:08:13 UTC 2025: >>> Collecting nodes from namespace kube-system <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-122-153.ec2.internal Ready worker 132m v1.34.1 10.0.122.153 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-16-184.ec2.internal Ready worker 125m v1.34.1 10.0.16.184 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-2-27.ec2.internal Ready control-plane,master 136m v1.34.1 10.0.2.27 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-32-248.ec2.internal Ready worker 131m v1.34.1 10.0.32.248 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-4-174.ec2.internal Ready control-plane,master 137m v1.34.1 10.0.4.174 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-97-71.ec2.internal Ready control-plane,master 138m v1.34.1 10.0.97.71 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:08:18: Running post command: ['scripts/ci/collect-service-logs.sh', 'prefetch-images', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE prefetch-images Active 104m INFO: Thu Nov 27 06:08:19 UTC 2025: >>> Collecting from namespace prefetch-images <<< INFO: Thu Nov 27 06:08:19 UTC 2025: >>> Collecting daemonsets from namespace prefetch-images <<< NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR qa-e2e 6 6 6 6 6 104m sleep quay.io/stackrox-io/image-prefetcher:v0.3.0 app=qa-e2e stackrox-images 6 6 6 6 6 104m sleep quay.io/stackrox-io/image-prefetcher:v0.3.0 app=stackrox-images INFO: Thu Nov 27 06:08:20 UTC 2025: >>> Collecting deployments from namespace prefetch-images <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR qa-e2e-metrics 1/1 1 1 104m aggregator quay.io/stackrox-io/image-prefetcher:v0.3.0 app=qa-e2e-metrics stackrox-images-metrics 1/1 1 1 104m aggregator quay.io/stackrox-io/image-prefetcher:v0.3.0 app=stackrox-images-metrics INFO: Thu Nov 27 06:08:21 UTC 2025: >>> Collecting services from namespace prefetch-images <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR qa-e2e-metrics LoadBalancer 172.30.87.156 ad9958a0d027d496baca8467e33a8aff-1933543295.XXXXXXXXX.elb.amazonaws.com 8443:30727/TCP,8080:30099/TCP 104m app=qa-e2e-metrics stackrox-images-metrics LoadBalancer 172.30.76.113 a6c1fd910f5144e908d5b727d93aa972-1885271625.XXXXXXXXX.elb.amazonaws.com 8443:31317/TCP,8080:31400/TCP 104m app=stackrox-images-metrics INFO: Thu Nov 27 06:08:22 UTC 2025: >>> Collecting pods from namespace prefetch-images <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES qa-e2e-4lljr 1/1 Running 0 104m 10.129.2.12 ip-10-0-16-184.ec2.internal qa-e2e-5p5p2 1/1 Running 0 104m 10.131.0.23 ip-10-0-122-153.ec2.internal qa-e2e-bmlgn 1/1 Running 0 104m 10.128.2.19 ip-10-0-32-248.ec2.internal qa-e2e-cqk8d 1/1 Running 0 104m 10.129.0.68 ip-10-0-4-174.ec2.internal qa-e2e-metrics-7fdf959548-j4c5c 1/1 Running 0 104m 10.128.2.18 ip-10-0-32-248.ec2.internal qa-e2e-n7m2z 1/1 Running 0 104m 10.130.0.82 ip-10-0-2-27.ec2.internal qa-e2e-stdhn 1/1 Running 0 104m 10.128.0.98 ip-10-0-97-71.ec2.internal stackrox-images-2qwf5 1/1 Running 0 104m 10.131.0.24 ip-10-0-122-153.ec2.internal stackrox-images-768x7 1/1 Running 0 104m 10.129.2.13 ip-10-0-16-184.ec2.internal stackrox-images-9wxjx 1/1 Running 0 104m 10.128.0.99 ip-10-0-97-71.ec2.internal stackrox-images-czhv7 1/1 Running 0 104m 10.128.2.21 ip-10-0-32-248.ec2.internal stackrox-images-gpl58 1/1 Running 0 104m 10.129.0.69 ip-10-0-4-174.ec2.internal stackrox-images-metrics-8d848757-sdzt5 1/1 Running 0 104m 10.128.2.20 ip-10-0-32-248.ec2.internal stackrox-images-wwz4z 1/1 Running 0 104m 10.130.0.83 ip-10-0-2-27.ec2.internal INFO: Thu Nov 27 06:08:23 UTC 2025: Dumping log of pods/qa-e2e-4lljr current container sleep in prefetch-images... INFO: Thu Nov 27 06:08:24 UTC 2025: Dumping log of pods/qa-e2e-4lljr current container prefetch in prefetch-images... INFO: Thu Nov 27 06:08:24 UTC 2025: Dumping log of pods/qa-e2e-5p5p2 current container sleep in prefetch-images... INFO: Thu Nov 27 06:08:25 UTC 2025: Dumping log of pods/qa-e2e-5p5p2 current container prefetch in prefetch-images... INFO: Thu Nov 27 06:08:25 UTC 2025: Dumping log of pods/qa-e2e-bmlgn current container sleep in prefetch-images... INFO: Thu Nov 27 06:08:26 UTC 2025: Dumping log of pods/qa-e2e-bmlgn current container prefetch in prefetch-images... INFO: Thu Nov 27 06:08:26 UTC 2025: Dumping log of pods/qa-e2e-cqk8d current container sleep in prefetch-images... INFO: Thu Nov 27 06:08:26 UTC 2025: Dumping log of pods/qa-e2e-cqk8d current container prefetch in prefetch-images... INFO: Thu Nov 27 06:08:27 UTC 2025: Dumping log of pods/qa-e2e-metrics-7fdf959548-j4c5c current container aggregator in prefetch-images... INFO: Thu Nov 27 06:08:28 UTC 2025: Dumping log of pods/qa-e2e-n7m2z current container sleep in prefetch-images... INFO: Thu Nov 27 06:08:28 UTC 2025: Dumping log of pods/qa-e2e-n7m2z current container prefetch in prefetch-images... INFO: Thu Nov 27 06:08:29 UTC 2025: Dumping log of pods/qa-e2e-stdhn current container sleep in prefetch-images... INFO: Thu Nov 27 06:08:29 UTC 2025: Dumping log of pods/qa-e2e-stdhn current container prefetch in prefetch-images... INFO: Thu Nov 27 06:08:30 UTC 2025: Dumping log of pods/stackrox-images-2qwf5 current container sleep in prefetch-images... INFO: Thu Nov 27 06:08:30 UTC 2025: Dumping log of pods/stackrox-images-2qwf5 current container prefetch in prefetch-images... INFO: Thu Nov 27 06:08:31 UTC 2025: Dumping log of pods/stackrox-images-768x7 current container sleep in prefetch-images... INFO: Thu Nov 27 06:08:31 UTC 2025: Dumping log of pods/stackrox-images-768x7 current container prefetch in prefetch-images... INFO: Thu Nov 27 06:08:32 UTC 2025: Dumping log of pods/stackrox-images-9wxjx current container sleep in prefetch-images... INFO: Thu Nov 27 06:08:32 UTC 2025: Dumping log of pods/stackrox-images-9wxjx current container prefetch in prefetch-images... INFO: Thu Nov 27 06:08:33 UTC 2025: Dumping log of pods/stackrox-images-czhv7 current container sleep in prefetch-images... INFO: Thu Nov 27 06:08:33 UTC 2025: Dumping log of pods/stackrox-images-czhv7 current container prefetch in prefetch-images... INFO: Thu Nov 27 06:08:34 UTC 2025: Dumping log of pods/stackrox-images-gpl58 current container sleep in prefetch-images... INFO: Thu Nov 27 06:08:34 UTC 2025: Dumping log of pods/stackrox-images-gpl58 current container prefetch in prefetch-images... INFO: Thu Nov 27 06:08:35 UTC 2025: Dumping log of pods/stackrox-images-metrics-8d848757-sdzt5 current container aggregator in prefetch-images... INFO: Thu Nov 27 06:08:36 UTC 2025: Dumping log of pods/stackrox-images-wwz4z current container sleep in prefetch-images... INFO: Thu Nov 27 06:08:36 UTC 2025: Dumping log of pods/stackrox-images-wwz4z current container prefetch in prefetch-images... INFO: Thu Nov 27 06:08:36 UTC 2025: >>> Collecting secrets from namespace prefetch-images <<< NAME TYPE DATA AGE builder-dockercfg-dcqvp kubernetes.io/dockercfg 1 105m default-dockercfg-mrzlm kubernetes.io/dockercfg 1 105m deployer-dockercfg-lpwg2 kubernetes.io/dockercfg 1 105m stackrox kubernetes.io/dockerconfigjson 1 105m INFO: Thu Nov 27 06:08:38 UTC 2025: >>> Collecting serviceaccounts from namespace prefetch-images <<< NAME SECRETS AGE builder 1 105m default 1 105m deployer 1 105m INFO: Thu Nov 27 06:08:40 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace prefetch-images <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 131m autoscaling.openshift.io 2 136m cluster-baremetal-validating-webhook-configuration 1 136m controlplanemachineset.machine.openshift.io 1 135m machine-api 2 136m monitoringconfigmaps.openshift.io 1 118m multus.openshift.io 1 138m network-node-identity.openshift.io 2 125m performance-addon-operator 1 141m prometheusrules.openshift.io 1 131m stackrox 2 99m INFO: Thu Nov 27 06:08:47 UTC 2025: >>> Collecting catalogsources from namespace prefetch-images <<< No resources found in prefetch-images namespace. INFO: Thu Nov 27 06:08:48 UTC 2025: >>> Collecting subscriptions from namespace prefetch-images <<< No resources found in prefetch-images namespace. INFO: Thu Nov 27 06:08:48 UTC 2025: >>> Collecting clusterserviceversions from namespace prefetch-images <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-442-g3e9694559e Advanced Cluster Security for Kubernetes 4.10.0-442-g3e9694559e rhacs-operator.v4.9.0 Succeeded INFO: Thu Nov 27 06:08:49 UTC 2025: >>> Collecting central from namespace prefetch-images <<< No resources found in prefetch-images namespace. INFO: Thu Nov 27 06:08:49 UTC 2025: >>> Collecting securedclusters from namespace prefetch-images <<< No resources found in prefetch-images namespace. INFO: Thu Nov 27 06:08:49 UTC 2025: >>> Collecting nodes from namespace prefetch-images <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-122-153.ec2.internal Ready worker 132m v1.34.1 10.0.122.153 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-16-184.ec2.internal Ready worker 125m v1.34.1 10.0.16.184 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-2-27.ec2.internal Ready control-plane,master 137m v1.34.1 10.0.2.27 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-32-248.ec2.internal Ready worker 132m v1.34.1 10.0.32.248 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-4-174.ec2.internal Ready control-plane,master 137m v1.34.1 10.0.4.174 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-97-71.ec2.internal Ready control-plane,master 139m v1.34.1 10.0.97.71 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:08:55: Running post command: ['scripts/ci/collect-service-logs.sh', 'default', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE default Active 143m INFO: Thu Nov 27 06:08:55 UTC 2025: >>> Collecting from namespace default <<< INFO: Thu Nov 27 06:08:55 UTC 2025: >>> Collecting daemonsets from namespace default <<< No resources found in default namespace. INFO: Thu Nov 27 06:08:55 UTC 2025: >>> Collecting deployments from namespace default <<< No resources found in default namespace. INFO: Thu Nov 27 06:08:55 UTC 2025: >>> Collecting services from namespace default <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR kubernetes ClusterIP 172.30.0.1 443/TCP 143m openshift ExternalName kubernetes.default.svc.cluster.local 136m INFO: Thu Nov 27 06:08:57 UTC 2025: >>> Collecting pods from namespace default <<< No resources found in default namespace. INFO: Thu Nov 27 06:08:57 UTC 2025: >>> Collecting secrets from namespace default <<< NAME TYPE DATA AGE builder-dockercfg-fmw96 kubernetes.io/dockercfg 1 125m default-dockercfg-xxk6c kubernetes.io/dockercfg 1 125m deployer-dockercfg-mntff kubernetes.io/dockercfg 1 125m INFO: Thu Nov 27 06:08:59 UTC 2025: >>> Collecting serviceaccounts from namespace default <<< NAME SECRETS AGE builder 1 125m default 1 143m deployer 1 125m INFO: Thu Nov 27 06:09:01 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace default <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 132m autoscaling.openshift.io 2 136m cluster-baremetal-validating-webhook-configuration 1 136m controlplanemachineset.machine.openshift.io 1 135m machine-api 2 136m monitoringconfigmaps.openshift.io 1 119m multus.openshift.io 1 138m network-node-identity.openshift.io 2 125m performance-addon-operator 1 141m prometheusrules.openshift.io 1 132m stackrox 2 99m INFO: Thu Nov 27 06:09:08 UTC 2025: >>> Collecting catalogsources from namespace default <<< No resources found in default namespace. INFO: Thu Nov 27 06:09:08 UTC 2025: >>> Collecting subscriptions from namespace default <<< No resources found in default namespace. INFO: Thu Nov 27 06:09:08 UTC 2025: >>> Collecting clusterserviceversions from namespace default <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-442-g3e9694559e Advanced Cluster Security for Kubernetes 4.10.0-442-g3e9694559e rhacs-operator.v4.9.0 Succeeded INFO: Thu Nov 27 06:09:09 UTC 2025: >>> Collecting central from namespace default <<< No resources found in default namespace. INFO: Thu Nov 27 06:09:09 UTC 2025: >>> Collecting securedclusters from namespace default <<< No resources found in default namespace. INFO: Thu Nov 27 06:09:09 UTC 2025: >>> Collecting nodes from namespace default <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-122-153.ec2.internal Ready worker 133m v1.34.1 10.0.122.153 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-16-184.ec2.internal Ready worker 126m v1.34.1 10.0.16.184 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-2-27.ec2.internal Ready control-plane,master 137m v1.34.1 10.0.2.27 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-32-248.ec2.internal Ready worker 132m v1.34.1 10.0.32.248 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-4-174.ec2.internal Ready control-plane,master 138m v1.34.1 10.0.4.174 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-97-71.ec2.internal Ready control-plane,master 139m v1.34.1 10.0.97.71 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:09:15: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-dns', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-dns Active 136m INFO: Thu Nov 27 06:09:15 UTC 2025: >>> Collecting from namespace openshift-dns <<< INFO: Thu Nov 27 06:09:15 UTC 2025: >>> Collecting daemonsets from namespace openshift-dns <<< NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR dns-default 6 6 6 6 6 kubernetes.io/os=linux 136m dns,kube-rbac-proxy quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3ee60b87360084ef5ebbc35b18204bd3dea2a3a99f90e2ddbf54962a6df5c4d7,quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6acf77d3f17317bc2a9a2819e26efcc6bc6125453d3893f9c54c0c2a46b54c5 dns.operator.openshift.io/daemonset-dns=default node-resolver 6 6 6 6 6 kubernetes.io/os=linux 136m dns-node-resolver quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fe0eaf3c9dd4275c3cde5f06afa69f9af87a8c85d315fe2ed896937efeb7b55c dns.operator.openshift.io/daemonset-node-resolver= INFO: Thu Nov 27 06:09:17 UTC 2025: >>> Collecting deployments from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Thu Nov 27 06:09:17 UTC 2025: >>> Collecting services from namespace openshift-dns <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR dns-default ClusterIP 172.30.0.10 53/UDP,53/TCP,9154/TCP 136m dns.operator.openshift.io/daemonset-dns=default INFO: Thu Nov 27 06:09:18 UTC 2025: >>> Collecting pods from namespace openshift-dns <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES dns-default-7gffp 2/2 Running 0 136m 10.129.0.18 ip-10-0-4-174.ec2.internal dns-default-8vhwj 2/2 Running 0 136m 10.130.0.14 ip-10-0-2-27.ec2.internal dns-default-kq55h 2/2 Running 0 132m 10.131.0.14 ip-10-0-122-153.ec2.internal dns-default-pv7zh 2/2 Running 0 125m 10.129.2.8 ip-10-0-16-184.ec2.internal dns-default-qnf4x 2/2 Running 0 132m 10.128.2.9 ip-10-0-32-248.ec2.internal dns-default-vmnb5 2/2 Running 0 136m 10.128.0.54 ip-10-0-97-71.ec2.internal node-resolver-dbsxs 1/1 Running 0 126m 10.0.16.184 ip-10-0-16-184.ec2.internal node-resolver-dh9kf 1/1 Running 0 133m 10.0.32.248 ip-10-0-32-248.ec2.internal node-resolver-gqcw8 1/1 Running 0 136m 10.0.2.27 ip-10-0-2-27.ec2.internal node-resolver-ncrz7 1/1 Running 0 136m 10.0.4.174 ip-10-0-4-174.ec2.internal node-resolver-rdxvn 1/1 Running 0 136m 10.0.97.71 ip-10-0-97-71.ec2.internal node-resolver-s78sw 1/1 Running 0 133m 10.0.122.153 ip-10-0-122-153.ec2.internal INFO: Thu Nov 27 06:09:18 UTC 2025: Dumping log of pods/dns-default-7gffp current container dns in openshift-dns... INFO: Thu Nov 27 06:09:19 UTC 2025: Dumping log of pods/dns-default-7gffp current container kube-rbac-proxy in openshift-dns... INFO: Thu Nov 27 06:09:19 UTC 2025: Dumping log of pods/dns-default-8vhwj current container dns in openshift-dns... INFO: Thu Nov 27 06:09:20 UTC 2025: Dumping log of pods/dns-default-8vhwj current container kube-rbac-proxy in openshift-dns... INFO: Thu Nov 27 06:09:21 UTC 2025: Dumping log of pods/dns-default-kq55h current container dns in openshift-dns... INFO: Thu Nov 27 06:09:21 UTC 2025: Dumping log of pods/dns-default-kq55h current container kube-rbac-proxy in openshift-dns... INFO: Thu Nov 27 06:09:22 UTC 2025: Dumping log of pods/dns-default-pv7zh current container dns in openshift-dns... INFO: Thu Nov 27 06:09:22 UTC 2025: Dumping log of pods/dns-default-pv7zh current container kube-rbac-proxy in openshift-dns... INFO: Thu Nov 27 06:09:23 UTC 2025: Dumping log of pods/dns-default-qnf4x current container dns in openshift-dns... INFO: Thu Nov 27 06:09:23 UTC 2025: Dumping log of pods/dns-default-qnf4x current container kube-rbac-proxy in openshift-dns... INFO: Thu Nov 27 06:09:24 UTC 2025: Dumping log of pods/dns-default-vmnb5 current container dns in openshift-dns... INFO: Thu Nov 27 06:09:24 UTC 2025: Dumping log of pods/dns-default-vmnb5 current container kube-rbac-proxy in openshift-dns... INFO: Thu Nov 27 06:09:25 UTC 2025: Dumping log of pods/node-resolver-dbsxs current container dns-node-resolver in openshift-dns... INFO: Thu Nov 27 06:09:25 UTC 2025: Dumping log of pods/node-resolver-dh9kf current container dns-node-resolver in openshift-dns... INFO: Thu Nov 27 06:09:26 UTC 2025: Dumping log of pods/node-resolver-gqcw8 current container dns-node-resolver in openshift-dns... INFO: Thu Nov 27 06:09:27 UTC 2025: Dumping log of pods/node-resolver-ncrz7 current container dns-node-resolver in openshift-dns... INFO: Thu Nov 27 06:09:28 UTC 2025: Dumping log of pods/node-resolver-rdxvn current container dns-node-resolver in openshift-dns... INFO: Thu Nov 27 06:09:28 UTC 2025: Dumping log of pods/node-resolver-s78sw current container dns-node-resolver in openshift-dns... INFO: Thu Nov 27 06:09:29 UTC 2025: >>> Collecting secrets from namespace openshift-dns <<< NAME TYPE DATA AGE builder-dockercfg-tjznb kubernetes.io/dockercfg 1 126m default-dockercfg-dgff6 kubernetes.io/dockercfg 1 126m deployer-dockercfg-z9t4z kubernetes.io/dockercfg 1 126m dns-default-metrics-tls kubernetes.io/tls 2 136m dns-dockercfg-zk8jp kubernetes.io/dockercfg 1 126m node-resolver-dockercfg-mcmcr kubernetes.io/dockercfg 1 126m INFO: Thu Nov 27 06:09:32 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-dns <<< NAME SECRETS AGE builder 1 126m default 1 137m deployer 1 126m dns 1 136m node-resolver 1 136m INFO: Thu Nov 27 06:09:35 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-dns <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 132m autoscaling.openshift.io 2 137m cluster-baremetal-validating-webhook-configuration 1 137m controlplanemachineset.machine.openshift.io 1 136m machine-api 2 137m monitoringconfigmaps.openshift.io 1 119m multus.openshift.io 1 139m network-node-identity.openshift.io 2 126m performance-addon-operator 1 142m prometheusrules.openshift.io 1 132m stackrox 2 100m INFO: Thu Nov 27 06:09:42 UTC 2025: >>> Collecting catalogsources from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Thu Nov 27 06:09:42 UTC 2025: >>> Collecting subscriptions from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Thu Nov 27 06:09:43 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-dns <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-442-g3e9694559e Advanced Cluster Security for Kubernetes 4.10.0-442-g3e9694559e rhacs-operator.v4.9.0 Succeeded INFO: Thu Nov 27 06:09:44 UTC 2025: >>> Collecting central from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Thu Nov 27 06:09:44 UTC 2025: >>> Collecting securedclusters from namespace openshift-dns <<< No resources found in openshift-dns namespace. INFO: Thu Nov 27 06:09:44 UTC 2025: >>> Collecting nodes from namespace openshift-dns <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-122-153.ec2.internal Ready worker 133m v1.34.1 10.0.122.153 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-16-184.ec2.internal Ready worker 126m v1.34.1 10.0.16.184 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-2-27.ec2.internal Ready control-plane,master 138m v1.34.1 10.0.2.27 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-32-248.ec2.internal Ready worker 133m v1.34.1 10.0.32.248 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-4-174.ec2.internal Ready control-plane,master 138m v1.34.1 10.0.4.174 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-97-71.ec2.internal Ready control-plane,master 140m v1.34.1 10.0.97.71 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:09:50: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-apiserver', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-apiserver Active 138m INFO: Thu Nov 27 06:09:50 UTC 2025: >>> Collecting from namespace openshift-apiserver <<< INFO: Thu Nov 27 06:09:50 UTC 2025: >>> Collecting daemonsets from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Thu Nov 27 06:09:50 UTC 2025: >>> Collecting deployments from namespace openshift-apiserver <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR apiserver 3/3 3 3 138m openshift-apiserver,openshift-apiserver-check-endpoints quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e4ac43c7ae9f82d3f2cc6dc4bc13cfd9dca621b15982493a59e458a26f95102a,quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:33260e735d30c8f9e69e282c4f357529628caa01d865fdf2272cc7397a94270f apiserver=true,app=openshift-apiserver-a INFO: Thu Nov 27 06:09:51 UTC 2025: >>> Collecting services from namespace openshift-apiserver <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR api ClusterIP 172.30.109.232 443/TCP 138m apiserver=true check-endpoints ClusterIP 172.30.171.152 17698/TCP 138m apiserver=true INFO: Thu Nov 27 06:09:52 UTC 2025: >>> Collecting pods from namespace openshift-apiserver <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES apiserver-5c8fbcbd8d-c2kjb 2/2 Running 0 122m 10.128.0.91 ip-10-0-97-71.ec2.internal apiserver-5c8fbcbd8d-ql5xg 2/2 Running 0 120m 10.129.0.64 ip-10-0-4-174.ec2.internal apiserver-5c8fbcbd8d-tsgtg 2/2 Running 0 118m 10.130.0.76 ip-10-0-2-27.ec2.internal INFO: Thu Nov 27 06:09:53 UTC 2025: Dumping log of pods/apiserver-5c8fbcbd8d-c2kjb current container openshift-apiserver in openshift-apiserver... INFO: Thu Nov 27 06:09:53 UTC 2025: Dumping log of pods/apiserver-5c8fbcbd8d-c2kjb current container openshift-apiserver-check-endpoints in openshift-apiserver... INFO: Thu Nov 27 06:09:54 UTC 2025: Dumping log of pods/apiserver-5c8fbcbd8d-c2kjb current container fix-audit-permissions in openshift-apiserver... INFO: Thu Nov 27 06:09:54 UTC 2025: Dumping log of pods/apiserver-5c8fbcbd8d-ql5xg current container openshift-apiserver in openshift-apiserver... INFO: Thu Nov 27 06:09:55 UTC 2025: Dumping log of pods/apiserver-5c8fbcbd8d-ql5xg current container openshift-apiserver-check-endpoints in openshift-apiserver... INFO: Thu Nov 27 06:09:55 UTC 2025: Dumping log of pods/apiserver-5c8fbcbd8d-ql5xg current container fix-audit-permissions in openshift-apiserver... INFO: Thu Nov 27 06:09:56 UTC 2025: Dumping log of pods/apiserver-5c8fbcbd8d-tsgtg current container openshift-apiserver in openshift-apiserver... INFO: Thu Nov 27 06:09:56 UTC 2025: Dumping log of pods/apiserver-5c8fbcbd8d-tsgtg current container openshift-apiserver-check-endpoints in openshift-apiserver... INFO: Thu Nov 27 06:09:56 UTC 2025: Dumping log of pods/apiserver-5c8fbcbd8d-tsgtg current container fix-audit-permissions in openshift-apiserver... INFO: Thu Nov 27 06:09:56 UTC 2025: >>> Collecting secrets from namespace openshift-apiserver <<< NAME TYPE DATA AGE builder-dockercfg-8zlqh kubernetes.io/dockercfg 1 126m default-dockercfg-99ddb kubernetes.io/dockercfg 1 126m deployer-dockercfg-kw2cd kubernetes.io/dockercfg 1 126m etcd-client kubernetes.io/tls 2 138m openshift-apiserver-sa-dockercfg-hfjm4 kubernetes.io/dockercfg 1 126m serving-cert kubernetes.io/tls 2 138m INFO: Thu Nov 27 06:10:00 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-apiserver <<< NAME SECRETS AGE builder 1 126m default 1 138m deployer 1 126m openshift-apiserver-sa 1 138m INFO: Thu Nov 27 06:10:02 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-apiserver <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 133m autoscaling.openshift.io 2 137m cluster-baremetal-validating-webhook-configuration 1 137m controlplanemachineset.machine.openshift.io 1 136m machine-api 2 137m monitoringconfigmaps.openshift.io 1 120m multus.openshift.io 1 139m network-node-identity.openshift.io 2 126m performance-addon-operator 1 142m prometheusrules.openshift.io 1 133m stackrox 2 100m INFO: Thu Nov 27 06:10:09 UTC 2025: >>> Collecting catalogsources from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Thu Nov 27 06:10:09 UTC 2025: >>> Collecting subscriptions from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Thu Nov 27 06:10:10 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-apiserver <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-442-g3e9694559e Advanced Cluster Security for Kubernetes 4.10.0-442-g3e9694559e rhacs-operator.v4.9.0 Succeeded INFO: Thu Nov 27 06:10:11 UTC 2025: >>> Collecting central from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Thu Nov 27 06:10:11 UTC 2025: >>> Collecting securedclusters from namespace openshift-apiserver <<< No resources found in openshift-apiserver namespace. INFO: Thu Nov 27 06:10:11 UTC 2025: >>> Collecting nodes from namespace openshift-apiserver <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-122-153.ec2.internal Ready worker 134m v1.34.1 10.0.122.153 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-16-184.ec2.internal Ready worker 127m v1.34.1 10.0.16.184 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-2-27.ec2.internal Ready control-plane,master 138m v1.34.1 10.0.2.27 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-32-248.ec2.internal Ready worker 133m v1.34.1 10.0.32.248 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-4-174.ec2.internal Ready control-plane,master 139m v1.34.1 10.0.4.174 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-97-71.ec2.internal Ready control-plane,master 140m v1.34.1 10.0.97.71 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:10:17: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-authentication', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-authentication Active 138m INFO: Thu Nov 27 06:10:17 UTC 2025: >>> Collecting from namespace openshift-authentication <<< INFO: Thu Nov 27 06:10:17 UTC 2025: >>> Collecting daemonsets from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Thu Nov 27 06:10:17 UTC 2025: >>> Collecting deployments from namespace openshift-authentication <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR oauth-openshift 3/3 3 3 124m oauth-openshift quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d4d951c52111ac77edbd14b216b60d82d25f5615bf4133ec4f05f2c1832bea97 app=oauth-openshift INFO: Thu Nov 27 06:10:18 UTC 2025: >>> Collecting services from namespace openshift-authentication <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR oauth-openshift ClusterIP 172.30.91.108 443/TCP 138m app=oauth-openshift INFO: Thu Nov 27 06:10:19 UTC 2025: >>> Collecting pods from namespace openshift-authentication <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES oauth-openshift-97f8b756b-n28z4 1/1 Running 0 124m 10.129.0.56 ip-10-0-4-174.ec2.internal oauth-openshift-97f8b756b-xr7ds 1/1 Running 0 124m 10.128.0.86 ip-10-0-97-71.ec2.internal oauth-openshift-97f8b756b-zh4v8 1/1 Running 0 124m 10.130.0.68 ip-10-0-2-27.ec2.internal INFO: Thu Nov 27 06:10:20 UTC 2025: Dumping log of pods/oauth-openshift-97f8b756b-n28z4 current container oauth-openshift in openshift-authentication... INFO: Thu Nov 27 06:10:20 UTC 2025: Dumping log of pods/oauth-openshift-97f8b756b-xr7ds current container oauth-openshift in openshift-authentication... INFO: Thu Nov 27 06:10:21 UTC 2025: Dumping log of pods/oauth-openshift-97f8b756b-zh4v8 current container oauth-openshift in openshift-authentication... INFO: Thu Nov 27 06:10:22 UTC 2025: >>> Collecting secrets from namespace openshift-authentication <<< NAME TYPE DATA AGE builder-dockercfg-9xhfc kubernetes.io/dockercfg 1 126m default-dockercfg-28bzx kubernetes.io/dockercfg 1 127m deployer-dockercfg-zlq4m kubernetes.io/dockercfg 1 126m oauth-openshift-dockercfg-p8jtv kubernetes.io/dockercfg 1 127m v4-0-config-system-ocp-branding-template Opaque 3 138m v4-0-config-system-router-certs Opaque 1 137m v4-0-config-system-serving-cert kubernetes.io/tls 2 138m v4-0-config-system-session Opaque 1 124m INFO: Thu Nov 27 06:10:26 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-authentication <<< NAME SECRETS AGE builder 1 127m default 1 139m deployer 1 127m oauth-openshift 1 138m INFO: Thu Nov 27 06:10:29 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-authentication <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 133m autoscaling.openshift.io 2 137m cluster-baremetal-validating-webhook-configuration 1 137m controlplanemachineset.machine.openshift.io 1 137m machine-api 2 137m monitoringconfigmaps.openshift.io 1 120m multus.openshift.io 1 140m network-node-identity.openshift.io 2 127m performance-addon-operator 1 143m prometheusrules.openshift.io 1 133m stackrox 2 101m INFO: Thu Nov 27 06:10:36 UTC 2025: >>> Collecting catalogsources from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Thu Nov 27 06:10:36 UTC 2025: >>> Collecting subscriptions from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Thu Nov 27 06:10:37 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-authentication <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-442-g3e9694559e Advanced Cluster Security for Kubernetes 4.10.0-442-g3e9694559e rhacs-operator.v4.9.0 Succeeded INFO: Thu Nov 27 06:10:38 UTC 2025: >>> Collecting central from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Thu Nov 27 06:10:38 UTC 2025: >>> Collecting securedclusters from namespace openshift-authentication <<< No resources found in openshift-authentication namespace. INFO: Thu Nov 27 06:10:38 UTC 2025: >>> Collecting nodes from namespace openshift-authentication <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-122-153.ec2.internal Ready worker 134m v1.34.1 10.0.122.153 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-16-184.ec2.internal Ready worker 127m v1.34.1 10.0.16.184 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-2-27.ec2.internal Ready control-plane,master 138m v1.34.1 10.0.2.27 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-32-248.ec2.internal Ready worker 134m v1.34.1 10.0.32.248 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-4-174.ec2.internal Ready control-plane,master 139m v1.34.1 10.0.4.174 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-97-71.ec2.internal Ready control-plane,master 141m v1.34.1 10.0.97.71 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:10:44: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-etcd', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-etcd Active 145m INFO: Thu Nov 27 06:10:44 UTC 2025: >>> Collecting from namespace openshift-etcd <<< INFO: Thu Nov 27 06:10:44 UTC 2025: >>> Collecting daemonsets from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Thu Nov 27 06:10:44 UTC 2025: >>> Collecting deployments from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Thu Nov 27 06:10:44 UTC 2025: >>> Collecting services from namespace openshift-etcd <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR etcd ClusterIP 172.30.145.29 2379/TCP,2380/TCP,9978/TCP,9979/TCP,9980/TCP 144m etcd=true INFO: Thu Nov 27 06:10:45 UTC 2025: >>> Collecting pods from namespace openshift-etcd <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES etcd-guard-ip-10-0-2-27.ec2.internal 1/1 Running 0 137m 10.130.0.17 ip-10-0-2-27.ec2.internal etcd-guard-ip-10-0-4-174.ec2.internal 1/1 Running 0 135m 10.129.0.32 ip-10-0-4-174.ec2.internal etcd-guard-ip-10-0-97-71.ec2.internal 1/1 Running 0 133m 10.128.0.67 ip-10-0-97-71.ec2.internal etcd-ip-10-0-2-27.ec2.internal 5/5 Running 0 120m 10.0.2.27 ip-10-0-2-27.ec2.internal etcd-ip-10-0-4-174.ec2.internal 5/5 Running 0 118m 10.0.4.174 ip-10-0-4-174.ec2.internal etcd-ip-10-0-97-71.ec2.internal 5/5 Running 0 116m 10.0.97.71 ip-10-0-97-71.ec2.internal installer-5-ip-10-0-97-71.ec2.internal 0/1 Completed 0 134m 10.128.0.65 ip-10-0-97-71.ec2.internal installer-7-ip-10-0-2-27.ec2.internal 0/1 Completed 0 132m 10.130.0.34 ip-10-0-2-27.ec2.internal installer-7-ip-10-0-4-174.ec2.internal 0/1 Completed 0 127m 10.129.0.47 ip-10-0-4-174.ec2.internal installer-7-ip-10-0-97-71.ec2.internal 0/1 Completed 0 125m 10.128.0.83 ip-10-0-97-71.ec2.internal installer-8-ip-10-0-2-27.ec2.internal 0/1 Completed 0 121m 10.130.0.73 ip-10-0-2-27.ec2.internal installer-8-ip-10-0-4-174.ec2.internal 0/1 Completed 0 119m 10.129.0.65 ip-10-0-4-174.ec2.internal installer-8-ip-10-0-97-71.ec2.internal 0/1 Completed 0 117m 10.128.0.96 ip-10-0-97-71.ec2.internal revision-pruner-7-ip-10-0-2-27.ec2.internal 0/1 Completed 0 123m 10.130.0.69 ip-10-0-2-27.ec2.internal revision-pruner-7-ip-10-0-4-174.ec2.internal 0/1 Completed 0 123m 10.129.0.58 ip-10-0-4-174.ec2.internal revision-pruner-7-ip-10-0-97-71.ec2.internal 0/1 Completed 0 123m 10.128.0.88 ip-10-0-97-71.ec2.internal revision-pruner-8-ip-10-0-2-27.ec2.internal 0/1 Completed 0 121m 10.130.0.72 ip-10-0-2-27.ec2.internal revision-pruner-8-ip-10-0-4-174.ec2.internal 0/1 Completed 0 121m 10.129.0.62 ip-10-0-4-174.ec2.internal revision-pruner-8-ip-10-0-97-71.ec2.internal 0/1 Completed 0 121m 10.128.0.90 ip-10-0-97-71.ec2.internal INFO: Thu Nov 27 06:10:46 UTC 2025: Dumping log of pods/etcd-guard-ip-10-0-2-27.ec2.internal current container guard in openshift-etcd... INFO: Thu Nov 27 06:10:47 UTC 2025: Dumping log of pods/etcd-guard-ip-10-0-4-174.ec2.internal current container guard in openshift-etcd... INFO: Thu Nov 27 06:10:47 UTC 2025: Dumping log of pods/etcd-guard-ip-10-0-97-71.ec2.internal current container guard in openshift-etcd... INFO: Thu Nov 27 06:10:48 UTC 2025: Dumping log of pods/etcd-ip-10-0-2-27.ec2.internal current container etcd in openshift-etcd... INFO: Thu Nov 27 06:10:48 UTC 2025: Dumping log of pods/etcd-ip-10-0-2-27.ec2.internal current container etcd-metrics in openshift-etcd... INFO: Thu Nov 27 06:10:49 UTC 2025: Dumping log of pods/etcd-ip-10-0-2-27.ec2.internal current container etcd-readyz in openshift-etcd... INFO: Thu Nov 27 06:10:49 UTC 2025: Dumping log of pods/etcd-ip-10-0-2-27.ec2.internal current container etcd-rev in openshift-etcd... INFO: Thu Nov 27 06:10:49 UTC 2025: Dumping log of pods/etcd-ip-10-0-2-27.ec2.internal current container etcdctl in openshift-etcd... INFO: Thu Nov 27 06:10:50 UTC 2025: Dumping log of pods/etcd-ip-10-0-2-27.ec2.internal current container setup in openshift-etcd... INFO: Thu Nov 27 06:10:50 UTC 2025: Dumping log of pods/etcd-ip-10-0-2-27.ec2.internal current container etcd-ensure-env-vars in openshift-etcd... INFO: Thu Nov 27 06:10:50 UTC 2025: Dumping log of pods/etcd-ip-10-0-2-27.ec2.internal current container etcd-resources-copy in openshift-etcd... INFO: Thu Nov 27 06:10:51 UTC 2025: Dumping log of pods/etcd-ip-10-0-4-174.ec2.internal current container etcd in openshift-etcd... INFO: Thu Nov 27 06:10:51 UTC 2025: Dumping log of pods/etcd-ip-10-0-4-174.ec2.internal current container etcd-metrics in openshift-etcd... INFO: Thu Nov 27 06:10:51 UTC 2025: Dumping log of pods/etcd-ip-10-0-4-174.ec2.internal current container etcd-readyz in openshift-etcd... INFO: Thu Nov 27 06:10:52 UTC 2025: Dumping log of pods/etcd-ip-10-0-4-174.ec2.internal current container etcd-rev in openshift-etcd... INFO: Thu Nov 27 06:10:52 UTC 2025: Dumping log of pods/etcd-ip-10-0-4-174.ec2.internal current container etcdctl in openshift-etcd... INFO: Thu Nov 27 06:10:52 UTC 2025: Dumping log of pods/etcd-ip-10-0-4-174.ec2.internal current container setup in openshift-etcd... INFO: Thu Nov 27 06:10:53 UTC 2025: Dumping log of pods/etcd-ip-10-0-4-174.ec2.internal current container etcd-ensure-env-vars in openshift-etcd... INFO: Thu Nov 27 06:10:53 UTC 2025: Dumping log of pods/etcd-ip-10-0-4-174.ec2.internal current container etcd-resources-copy in openshift-etcd... INFO: Thu Nov 27 06:10:54 UTC 2025: Dumping log of pods/etcd-ip-10-0-97-71.ec2.internal current container etcd in openshift-etcd... INFO: Thu Nov 27 06:10:54 UTC 2025: Dumping log of pods/etcd-ip-10-0-97-71.ec2.internal current container etcd-metrics in openshift-etcd... INFO: Thu Nov 27 06:10:54 UTC 2025: Dumping log of pods/etcd-ip-10-0-97-71.ec2.internal current container etcd-readyz in openshift-etcd... INFO: Thu Nov 27 06:10:54 UTC 2025: Dumping log of pods/etcd-ip-10-0-97-71.ec2.internal current container etcd-rev in openshift-etcd... INFO: Thu Nov 27 06:10:55 UTC 2025: Dumping log of pods/etcd-ip-10-0-97-71.ec2.internal current container etcdctl in openshift-etcd... INFO: Thu Nov 27 06:10:55 UTC 2025: Dumping log of pods/etcd-ip-10-0-97-71.ec2.internal current container setup in openshift-etcd... INFO: Thu Nov 27 06:10:55 UTC 2025: Dumping log of pods/etcd-ip-10-0-97-71.ec2.internal current container etcd-ensure-env-vars in openshift-etcd... INFO: Thu Nov 27 06:10:56 UTC 2025: Dumping log of pods/etcd-ip-10-0-97-71.ec2.internal current container etcd-resources-copy in openshift-etcd... INFO: Thu Nov 27 06:10:56 UTC 2025: Dumping log of pods/installer-5-ip-10-0-97-71.ec2.internal current container installer in openshift-etcd... INFO: Thu Nov 27 06:10:57 UTC 2025: Dumping log of pods/installer-7-ip-10-0-2-27.ec2.internal current container installer in openshift-etcd... INFO: Thu Nov 27 06:10:58 UTC 2025: Dumping log of pods/installer-7-ip-10-0-4-174.ec2.internal current container installer in openshift-etcd... INFO: Thu Nov 27 06:10:59 UTC 2025: Dumping log of pods/installer-7-ip-10-0-97-71.ec2.internal current container installer in openshift-etcd... INFO: Thu Nov 27 06:10:59 UTC 2025: Dumping log of pods/installer-8-ip-10-0-2-27.ec2.internal current container installer in openshift-etcd... INFO: Thu Nov 27 06:11:00 UTC 2025: Dumping log of pods/installer-8-ip-10-0-4-174.ec2.internal current container installer in openshift-etcd... INFO: Thu Nov 27 06:11:01 UTC 2025: Dumping log of pods/installer-8-ip-10-0-97-71.ec2.internal current container installer in openshift-etcd... INFO: Thu Nov 27 06:11:02 UTC 2025: Dumping log of pods/revision-pruner-7-ip-10-0-2-27.ec2.internal current container pruner in openshift-etcd... INFO: Thu Nov 27 06:11:03 UTC 2025: Dumping log of pods/revision-pruner-7-ip-10-0-4-174.ec2.internal current container pruner in openshift-etcd... INFO: Thu Nov 27 06:11:03 UTC 2025: Dumping log of pods/revision-pruner-7-ip-10-0-97-71.ec2.internal current container pruner in openshift-etcd... INFO: Thu Nov 27 06:11:04 UTC 2025: Dumping log of pods/revision-pruner-8-ip-10-0-2-27.ec2.internal current container pruner in openshift-etcd... INFO: Thu Nov 27 06:11:05 UTC 2025: Dumping log of pods/revision-pruner-8-ip-10-0-4-174.ec2.internal current container pruner in openshift-etcd... INFO: Thu Nov 27 06:11:06 UTC 2025: Dumping log of pods/revision-pruner-8-ip-10-0-97-71.ec2.internal current container pruner in openshift-etcd... INFO: Thu Nov 27 06:11:06 UTC 2025: >>> Collecting secrets from namespace openshift-etcd <<< NAME TYPE DATA AGE builder-dockercfg-m2s29 kubernetes.io/dockercfg 1 127m default-dockercfg-7t8qz kubernetes.io/dockercfg 1 127m deployer-dockercfg-bdn92 kubernetes.io/dockercfg 1 127m etcd-all-certs Opaque 18 144m etcd-all-certs-4 Opaque 18 135m etcd-all-certs-5 Opaque 18 134m etcd-all-certs-6 Opaque 18 132m etcd-all-certs-7 Opaque 18 132m etcd-all-certs-8 Opaque 18 122m etcd-backup-sa-dockercfg-zxzgj kubernetes.io/dockercfg 1 127m etcd-client kubernetes.io/tls 2 144m etcd-metric-client kubernetes.io/tls 2 144m etcd-metric-signer kubernetes.io/tls 2 144m etcd-peer-ip-10-0-133-35 kubernetes.io/tls 2 144m etcd-peer-ip-10-0-2-27.ec2.internal kubernetes.io/tls 2 139m etcd-peer-ip-10-0-4-174.ec2.internal kubernetes.io/tls 2 139m etcd-peer-ip-10-0-97-71.ec2.internal kubernetes.io/tls 2 139m etcd-sa-dockercfg-b52cp kubernetes.io/dockercfg 1 127m etcd-serving-ip-10-0-133-35 kubernetes.io/tls 2 144m etcd-serving-ip-10-0-2-27.ec2.internal kubernetes.io/tls 2 139m etcd-serving-ip-10-0-4-174.ec2.internal kubernetes.io/tls 2 139m etcd-serving-ip-10-0-97-71.ec2.internal kubernetes.io/tls 2 139m etcd-serving-metrics-ip-10-0-133-35 kubernetes.io/tls 2 144m etcd-serving-metrics-ip-10-0-2-27.ec2.internal kubernetes.io/tls 2 139m etcd-serving-metrics-ip-10-0-4-174.ec2.internal kubernetes.io/tls 2 139m etcd-serving-metrics-ip-10-0-97-71.ec2.internal kubernetes.io/tls 2 139m etcd-signer kubernetes.io/tls 2 144m installer-sa-dockercfg-bp5x2 kubernetes.io/dockercfg 1 127m serving-cert kubernetes.io/tls 2 139m INFO: Thu Nov 27 06:11:22 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-etcd <<< NAME SECRETS AGE builder 1 127m default 1 145m deployer 1 127m etcd-backup-sa 1 139m etcd-sa 1 139m installer-sa 1 139m INFO: Thu Nov 27 06:11:26 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-etcd <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 134m autoscaling.openshift.io 2 138m cluster-baremetal-validating-webhook-configuration 1 138m controlplanemachineset.machine.openshift.io 1 138m machine-api 2 138m monitoringconfigmaps.openshift.io 1 121m multus.openshift.io 1 141m network-node-identity.openshift.io 2 127m performance-addon-operator 1 144m prometheusrules.openshift.io 1 134m stackrox 2 101m INFO: Thu Nov 27 06:11:33 UTC 2025: >>> Collecting catalogsources from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Thu Nov 27 06:11:33 UTC 2025: >>> Collecting subscriptions from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Thu Nov 27 06:11:33 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-etcd <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-442-g3e9694559e Advanced Cluster Security for Kubernetes 4.10.0-442-g3e9694559e rhacs-operator.v4.9.0 Succeeded INFO: Thu Nov 27 06:11:34 UTC 2025: >>> Collecting central from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Thu Nov 27 06:11:34 UTC 2025: >>> Collecting securedclusters from namespace openshift-etcd <<< No resources found in openshift-etcd namespace. INFO: Thu Nov 27 06:11:35 UTC 2025: >>> Collecting nodes from namespace openshift-etcd <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-122-153.ec2.internal Ready worker 135m v1.34.1 10.0.122.153 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-16-184.ec2.internal Ready worker 128m v1.34.1 10.0.16.184 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-2-27.ec2.internal Ready control-plane,master 139m v1.34.1 10.0.2.27 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-32-248.ec2.internal Ready worker 135m v1.34.1 10.0.32.248 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-4-174.ec2.internal Ready control-plane,master 140m v1.34.1 10.0.4.174 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-97-71.ec2.internal Ready control-plane,master 142m v1.34.1 10.0.97.71 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:11:40: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-controller-manager', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-controller-manager Active 140m INFO: Thu Nov 27 06:11:41 UTC 2025: >>> Collecting from namespace openshift-controller-manager <<< INFO: Thu Nov 27 06:11:41 UTC 2025: >>> Collecting daemonsets from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Thu Nov 27 06:11:41 UTC 2025: >>> Collecting deployments from namespace openshift-controller-manager <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR controller-manager 3/3 3 3 140m controller-manager quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:34ff074153c51656d782207c301a9c4ee6180a9199a582e13280f3342dcb59b1 app=openshift-controller-manager-a,controller-manager=true INFO: Thu Nov 27 06:11:42 UTC 2025: >>> Collecting services from namespace openshift-controller-manager <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR controller-manager ClusterIP 172.30.36.234 443/TCP 140m controller-manager=true INFO: Thu Nov 27 06:11:42 UTC 2025: >>> Collecting pods from namespace openshift-controller-manager <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES controller-manager-6bbb77bc8b-2nh44 1/1 Running 0 128m 10.128.0.81 ip-10-0-97-71.ec2.internal controller-manager-6bbb77bc8b-cphff 1/1 Running 0 128m 10.129.0.51 ip-10-0-4-174.ec2.internal controller-manager-6bbb77bc8b-pjn56 1/1 Running 0 128m 10.130.0.59 ip-10-0-2-27.ec2.internal INFO: Thu Nov 27 06:11:43 UTC 2025: Dumping log of pods/controller-manager-6bbb77bc8b-2nh44 current container controller-manager in openshift-controller-manager... INFO: Thu Nov 27 06:11:44 UTC 2025: Dumping log of pods/controller-manager-6bbb77bc8b-cphff current container controller-manager in openshift-controller-manager... INFO: Thu Nov 27 06:11:45 UTC 2025: Dumping log of pods/controller-manager-6bbb77bc8b-pjn56 current container controller-manager in openshift-controller-manager... INFO: Thu Nov 27 06:11:45 UTC 2025: >>> Collecting secrets from namespace openshift-controller-manager <<< NAME TYPE DATA AGE builder-dockercfg-257zl kubernetes.io/dockercfg 1 128m default-dockercfg-g457c kubernetes.io/dockercfg 1 128m deployer-dockercfg-mkc9l kubernetes.io/dockercfg 1 128m openshift-controller-manager-sa-dockercfg-mpl55 kubernetes.io/dockercfg 1 128m serving-cert kubernetes.io/tls 2 140m INFO: Thu Nov 27 06:11:48 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-controller-manager <<< NAME SECRETS AGE builder 1 128m default 1 140m deployer 1 128m openshift-controller-manager-sa 1 140m INFO: Thu Nov 27 06:11:50 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-controller-manager <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 134m autoscaling.openshift.io 2 139m cluster-baremetal-validating-webhook-configuration 1 139m controlplanemachineset.machine.openshift.io 1 138m machine-api 2 139m monitoringconfigmaps.openshift.io 1 122m multus.openshift.io 1 141m network-node-identity.openshift.io 2 128m performance-addon-operator 1 144m prometheusrules.openshift.io 1 134m stackrox 2 102m INFO: Thu Nov 27 06:11:58 UTC 2025: >>> Collecting catalogsources from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Thu Nov 27 06:11:58 UTC 2025: >>> Collecting subscriptions from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Thu Nov 27 06:11:58 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-controller-manager <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-442-g3e9694559e Advanced Cluster Security for Kubernetes 4.10.0-442-g3e9694559e rhacs-operator.v4.9.0 Succeeded INFO: Thu Nov 27 06:11:59 UTC 2025: >>> Collecting central from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Thu Nov 27 06:11:59 UTC 2025: >>> Collecting securedclusters from namespace openshift-controller-manager <<< No resources found in openshift-controller-manager namespace. INFO: Thu Nov 27 06:11:59 UTC 2025: >>> Collecting nodes from namespace openshift-controller-manager <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-122-153.ec2.internal Ready worker 136m v1.34.1 10.0.122.153 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-16-184.ec2.internal Ready worker 128m v1.34.1 10.0.16.184 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-2-27.ec2.internal Ready control-plane,master 140m v1.34.1 10.0.2.27 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-32-248.ec2.internal Ready worker 135m v1.34.1 10.0.32.248 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-4-174.ec2.internal Ready control-plane,master 141m v1.34.1 10.0.4.174 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-97-71.ec2.internal Ready control-plane,master 142m v1.34.1 10.0.97.71 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:12:05: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-compliance', '/tmp/k8s-service-logs/part-1/k8s-logs'] Error from server (NotFound): namespaces "openshift-compliance" not found INFO: Thu Nov 27 06:12:05 UTC 2025: Skipping missing namespace openshift-compliance 06:12:05: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-ingress', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-ingress Active 139m INFO: Thu Nov 27 06:12:05 UTC 2025: >>> Collecting from namespace openshift-ingress <<< INFO: Thu Nov 27 06:12:05 UTC 2025: >>> Collecting daemonsets from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Thu Nov 27 06:12:06 UTC 2025: >>> Collecting deployments from namespace openshift-ingress <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR router-default 2/2 2 2 139m router quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c95713a879ddb263f1b061bc6492926ec6434c96501bc59740d585a01cfb5097 ingresscontroller.operator.openshift.io/deployment-ingresscontroller=default INFO: Thu Nov 27 06:12:06 UTC 2025: >>> Collecting services from namespace openshift-ingress <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR router-default LoadBalancer 172.30.154.228 a60750cfcfc554f75aefd5c76f700794-1854388884.XXXXXXXXX.elb.amazonaws.com 80:32216/TCP,443:30881/TCP 139m ingresscontroller.operator.openshift.io/deployment-ingresscontroller=default router-internal-default ClusterIP 172.30.226.26 80/TCP,443/TCP,1936/TCP 139m ingresscontroller.operator.openshift.io/deployment-ingresscontroller=default INFO: Thu Nov 27 06:12:08 UTC 2025: >>> Collecting pods from namespace openshift-ingress <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES router-default-8675f74d77-5txgz 1/1 Running 2 (129m ago) 139m 10.128.2.7 ip-10-0-32-248.ec2.internal router-default-8675f74d77-ppnmq 1/1 Running 2 (129m ago) 139m 10.131.0.6 ip-10-0-122-153.ec2.internal INFO: Thu Nov 27 06:12:08 UTC 2025: Dumping log of pods/router-default-8675f74d77-5txgz current container router in openshift-ingress... INFO: Thu Nov 27 06:12:09 UTC 2025: Dumping log of pods/router-default-8675f74d77-5txgz previous container router in openshift-ingress... INFO: Thu Nov 27 06:12:10 UTC 2025: Dumping log of pods/router-default-8675f74d77-ppnmq current container router in openshift-ingress... INFO: Thu Nov 27 06:12:10 UTC 2025: Dumping log of pods/router-default-8675f74d77-ppnmq previous container router in openshift-ingress... INFO: Thu Nov 27 06:12:10 UTC 2025: >>> Collecting secrets from namespace openshift-ingress <<< NAME TYPE DATA AGE builder-dockercfg-6ld96 kubernetes.io/dockercfg 1 128m default-dockercfg-fkbvg kubernetes.io/dockercfg 1 128m deployer-dockercfg-kv7q8 kubernetes.io/dockercfg 1 128m router-certs-default kubernetes.io/tls 2 139m router-dockercfg-sbbkn kubernetes.io/dockercfg 1 128m router-metrics-certs-default kubernetes.io/tls 2 139m router-stats-default Opaque 2 139m INFO: Thu Nov 27 06:12:14 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-ingress <<< NAME SECRETS AGE builder 1 128m default 1 139m deployer 1 128m router 1 139m INFO: Thu Nov 27 06:12:16 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-ingress <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 135m autoscaling.openshift.io 2 139m cluster-baremetal-validating-webhook-configuration 1 139m controlplanemachineset.machine.openshift.io 1 139m machine-api 2 139m monitoringconfigmaps.openshift.io 1 122m multus.openshift.io 1 142m network-node-identity.openshift.io 2 128m performance-addon-operator 1 145m prometheusrules.openshift.io 1 135m stackrox 2 102m INFO: Thu Nov 27 06:12:23 UTC 2025: >>> Collecting catalogsources from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Thu Nov 27 06:12:24 UTC 2025: >>> Collecting subscriptions from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Thu Nov 27 06:12:24 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-ingress <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-442-g3e9694559e Advanced Cluster Security for Kubernetes 4.10.0-442-g3e9694559e rhacs-operator.v4.9.0 Succeeded INFO: Thu Nov 27 06:12:25 UTC 2025: >>> Collecting central from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Thu Nov 27 06:12:25 UTC 2025: >>> Collecting securedclusters from namespace openshift-ingress <<< No resources found in openshift-ingress namespace. INFO: Thu Nov 27 06:12:25 UTC 2025: >>> Collecting nodes from namespace openshift-ingress <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-122-153.ec2.internal Ready worker 136m v1.34.1 10.0.122.153 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-16-184.ec2.internal Ready worker 129m v1.34.1 10.0.16.184 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-2-27.ec2.internal Ready control-plane,master 140m v1.34.1 10.0.2.27 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-32-248.ec2.internal Ready worker 136m v1.34.1 10.0.32.248 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-4-174.ec2.internal Ready control-plane,master 141m v1.34.1 10.0.4.174 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-97-71.ec2.internal Ready control-plane,master 143m v1.34.1 10.0.97.71 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:12:31: Running post command: ['scripts/ci/collect-service-logs.sh', 'openshift-marketplace', '/tmp/k8s-service-logs/part-1/k8s-logs'] NAME STATUS AGE openshift-marketplace Active 145m INFO: Thu Nov 27 06:12:31 UTC 2025: >>> Collecting from namespace openshift-marketplace <<< INFO: Thu Nov 27 06:12:31 UTC 2025: >>> Collecting daemonsets from namespace openshift-marketplace <<< No resources found in openshift-marketplace namespace. INFO: Thu Nov 27 06:12:31 UTC 2025: >>> Collecting deployments from namespace openshift-marketplace <<< NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR marketplace-operator 1/1 1 1 145m marketplace-operator quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:33e976d6c3d3518810fedee2fa24cf4913e665231216c80766b8aa51b9875b25 name=marketplace-operator INFO: Thu Nov 27 06:12:32 UTC 2025: >>> Collecting services from namespace openshift-marketplace <<< NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR certified-operators ClusterIP 172.30.41.3 50051/TCP 139m olm.catalogSource=certified-operators,olm.managed=true community-operators ClusterIP 172.30.69.63 50051/TCP 139m olm.catalogSource=community-operators,olm.managed=true marketplace-operator-metrics ClusterIP 172.30.67.112 8383/TCP,8081/TCP 145m name=marketplace-operator redhat-marketplace ClusterIP 172.30.103.244 50051/TCP 139m olm.catalogSource=redhat-marketplace,olm.managed=true redhat-operators ClusterIP 172.30.206.203 50051/TCP 139m olm.catalogSource=redhat-operators,olm.managed=true INFO: Thu Nov 27 06:12:35 UTC 2025: >>> Collecting pods from namespace openshift-marketplace <<< NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES certified-operators-vhcjn 1/1 Running 0 129m 10.130.0.57 ip-10-0-2-27.ec2.internal community-operators-jf4xt 1/1 Running 0 129m 10.130.0.58 ip-10-0-2-27.ec2.internal marketplace-operator-6c8bf594c6-m6rdw 1/1 Running 1 (130m ago) 142m 10.128.0.15 ip-10-0-97-71.ec2.internal redhat-marketplace-nf4cc 1/1 Running 0 129m 10.129.0.49 ip-10-0-4-174.ec2.internal redhat-operators-kwkx7 1/1 Running 0 129m 10.129.0.48 ip-10-0-4-174.ec2.internal INFO: Thu Nov 27 06:12:36 UTC 2025: Dumping log of pods/certified-operators-vhcjn current container registry-server in openshift-marketplace... INFO: Thu Nov 27 06:12:37 UTC 2025: Dumping log of pods/certified-operators-vhcjn current container extract-utilities in openshift-marketplace... INFO: Thu Nov 27 06:12:37 UTC 2025: Dumping log of pods/certified-operators-vhcjn current container extract-content in openshift-marketplace... INFO: Thu Nov 27 06:12:38 UTC 2025: Dumping log of pods/community-operators-jf4xt current container registry-server in openshift-marketplace... INFO: Thu Nov 27 06:12:39 UTC 2025: Dumping log of pods/community-operators-jf4xt current container extract-utilities in openshift-marketplace... INFO: Thu Nov 27 06:12:40 UTC 2025: Dumping log of pods/community-operators-jf4xt current container extract-content in openshift-marketplace... INFO: Thu Nov 27 06:12:40 UTC 2025: Dumping log of pods/marketplace-operator-6c8bf594c6-m6rdw current container marketplace-operator in openshift-marketplace... INFO: Thu Nov 27 06:12:41 UTC 2025: Dumping log of pods/marketplace-operator-6c8bf594c6-m6rdw previous container marketplace-operator in openshift-marketplace... INFO: Thu Nov 27 06:12:41 UTC 2025: Dumping log of pods/redhat-marketplace-nf4cc current container registry-server in openshift-marketplace... INFO: Thu Nov 27 06:12:42 UTC 2025: Dumping log of pods/redhat-marketplace-nf4cc current container extract-utilities in openshift-marketplace... INFO: Thu Nov 27 06:12:42 UTC 2025: Dumping log of pods/redhat-marketplace-nf4cc current container extract-content in openshift-marketplace... INFO: Thu Nov 27 06:12:43 UTC 2025: Dumping log of pods/redhat-operators-kwkx7 current container registry-server in openshift-marketplace... INFO: Thu Nov 27 06:12:44 UTC 2025: Dumping log of pods/redhat-operators-kwkx7 current container extract-utilities in openshift-marketplace... INFO: Thu Nov 27 06:12:44 UTC 2025: Dumping log of pods/redhat-operators-kwkx7 current container extract-content in openshift-marketplace... INFO: Thu Nov 27 06:12:44 UTC 2025: >>> Collecting secrets from namespace openshift-marketplace <<< NAME TYPE DATA AGE builder-dockercfg-tmg68 kubernetes.io/dockercfg 1 129m certified-operators-dockercfg-p6lvh kubernetes.io/dockercfg 1 129m community-operators-dockercfg-d8pr6 kubernetes.io/dockercfg 1 129m default-dockercfg-sbxgt kubernetes.io/dockercfg 1 129m deployer-dockercfg-qgm8x kubernetes.io/dockercfg 1 129m marketplace-operator-dockercfg-5skwr kubernetes.io/dockercfg 1 129m marketplace-operator-metrics kubernetes.io/tls 2 141m redhat-marketplace-dockercfg-zfs8j kubernetes.io/dockercfg 1 129m redhat-operators-dockercfg-tj89s kubernetes.io/dockercfg 1 129m INFO: Thu Nov 27 06:12:49 UTC 2025: >>> Collecting serviceaccounts from namespace openshift-marketplace <<< NAME SECRETS AGE builder 1 129m certified-operators 1 140m community-operators 1 140m default 1 146m deployer 1 129m marketplace-operator 1 146m redhat-marketplace 1 140m redhat-operators 1 140m INFO: Thu Nov 27 06:12:54 UTC 2025: >>> Collecting validatingwebhookconfigurations from namespace openshift-marketplace <<< NAME WEBHOOKS AGE alertmanagerconfigs.openshift.io 1 136m autoscaling.openshift.io 2 140m cluster-baremetal-validating-webhook-configuration 1 140m controlplanemachineset.machine.openshift.io 1 139m machine-api 2 140m monitoringconfigmaps.openshift.io 1 123m multus.openshift.io 1 142m network-node-identity.openshift.io 2 129m performance-addon-operator 1 145m prometheusrules.openshift.io 1 136m stackrox 2 103m INFO: Thu Nov 27 06:13:01 UTC 2025: >>> Collecting catalogsources from namespace openshift-marketplace <<< NAME DISPLAY TYPE PUBLISHER AGE certified-operators Certified Operators grpc Red Hat 140m community-operators Community Operators grpc Red Hat 140m redhat-marketplace Red Hat Marketplace grpc Red Hat 140m redhat-operators Red Hat Operators grpc Red Hat 140m INFO: Thu Nov 27 06:13:04 UTC 2025: >>> Collecting subscriptions from namespace openshift-marketplace <<< No resources found in openshift-marketplace namespace. INFO: Thu Nov 27 06:13:04 UTC 2025: >>> Collecting clusterserviceversions from namespace openshift-marketplace <<< NAME DISPLAY VERSION REPLACES PHASE rhacs-operator.v4.10.0-442-g3e9694559e Advanced Cluster Security for Kubernetes 4.10.0-442-g3e9694559e rhacs-operator.v4.9.0 Succeeded INFO: Thu Nov 27 06:13:05 UTC 2025: >>> Collecting central from namespace openshift-marketplace <<< No resources found in openshift-marketplace namespace. INFO: Thu Nov 27 06:13:05 UTC 2025: >>> Collecting securedclusters from namespace openshift-marketplace <<< No resources found in openshift-marketplace namespace. INFO: Thu Nov 27 06:13:05 UTC 2025: >>> Collecting nodes from namespace openshift-marketplace <<< NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME ip-10-0-122-153.ec2.internal Ready worker 137m v1.34.1 10.0.122.153 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-16-184.ec2.internal Ready worker 130m v1.34.1 10.0.16.184 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-2-27.ec2.internal Ready control-plane,master 141m v1.34.1 10.0.2.27 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-32-248.ec2.internal Ready worker 136m v1.34.1 10.0.32.248 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-4-174.ec2.internal Ready control-plane,master 142m v1.34.1 10.0.4.174 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 ip-10-0-97-71.ec2.internal Ready control-plane,master 143m v1.34.1 10.0.97.71 Red Hat Enterprise Linux CoreOS 9.6.20251121-0 (Plow) 5.14.0-570.66.1.el9_6.x86_64 cri-o://1.34.1-4.rhaos4.21.git5780ac7.el9 06:13:11: Running post command: ['scripts/ci/collect-infrastructure-logs.sh', '/tmp/k8s-service-logs/part-1/k8s-logs'] Thu Nov 27 06:13:11 UTC 2025 Attempting to collect kube API server audit logs Client Version: 4.11.0-0.okd-2022-12-02-145640 Kustomize Version: v4.5.4 Server Version: 4.21.0-0.nightly-2025-11-22-193140 Kubernetes Version: v1.34.1 [must-gather ] OUT Using must-gather plug-in image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:698aa2e4879ec5cd5587bf1d5343931436659f7201f6f131d6d352966cdd5071 When opening a support case, bugzilla, or issue please include the following summary data along with any other requested information: ClusterID: 29ce9b76-7a3c-446a-aac4-df4d9ae2eeee ClusterVersion: Stable at "4.21.0-0.nightly-2025-11-22-193140" ClusterOperators: All healthy and stable [must-gather ] OUT namespace/openshift-must-gather-69x2f created [must-gather ] OUT clusterrolebinding.rbac.authorization.k8s.io/must-gather-m9f4d created Warning: spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead [must-gather ] OUT pod for plug-in image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:698aa2e4879ec5cd5587bf1d5343931436659f7201f6f131d6d352966cdd5071 created [must-gather-hv6rc] POD 2025-11-27T06:13:14.271388336Z WARNING: Collecting one or more audit logs on ALL masters in your cluster. This could take a large amount of time. [must-gather-hv6rc] POD 2025-11-27T06:13:14.389238696Z INFO: Started downloading openshift-apiserver/audit.log from ip-10-0-2-27.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.389985524Z INFO: Started downloading openshift-apiserver/audit.log from ip-10-0-4-174.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.390959678Z INFO: Started downloading openshift-apiserver/audit.log from ip-10-0-97-71.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.539386914Z INFO: Started downloading kube-apiserver/audit-2025-11-27T05-27-57.703.log from ip-10-0-2-27.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.540187293Z INFO: Started downloading kube-apiserver/audit.log from ip-10-0-2-27.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.547047271Z INFO: Started downloading kube-apiserver/termination.log from ip-10-0-2-27.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.554535704Z INFO: Started downloading kube-apiserver/audit.log from ip-10-0-4-174.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.554970835Z INFO: Started downloading kube-apiserver/audit-2025-11-27T05-16-50.237.log from ip-10-0-4-174.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.571852217Z INFO: Started downloading kube-apiserver/termination.log from ip-10-0-4-174.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.579788061Z INFO: Started downloading kube-apiserver/audit-2025-11-27T05-48-18.587.log from ip-10-0-97-71.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.595334421Z INFO: Started downloading kube-apiserver/audit.log from ip-10-0-97-71.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.596826387Z INFO: Finished downloading openshift-apiserver/audit.log from ip-10-0-4-174.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.618626040Z INFO: Started downloading kube-apiserver/termination.log from ip-10-0-97-71.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.630055989Z INFO: Finished downloading openshift-apiserver/audit.log from ip-10-0-2-27.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.650191331Z INFO: Finished downloading openshift-apiserver/audit.log from ip-10-0-97-71.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.852221206Z INFO: Finished downloading kube-apiserver/termination.log from ip-10-0-2-27.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.881213165Z INFO: Finished downloading kube-apiserver/termination.log from ip-10-0-4-174.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.916147628Z INFO: Started downloading oauth-apiserver/audit.log from ip-10-0-2-27.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.928268724Z INFO: Started downloading oauth-apiserver/audit.log from ip-10-0-97-71.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:14.932583620Z INFO: Started downloading oauth-apiserver/audit.log from ip-10-0-4-174.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:15.254913284Z INFO: Finished downloading kube-apiserver/termination.log from ip-10-0-97-71.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:15.373183873Z INFO: Finished downloading oauth-apiserver/audit.log from ip-10-0-4-174.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:15.415243231Z INFO: Finished downloading oauth-apiserver/audit.log from ip-10-0-2-27.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:15.538471171Z INFO: Finished downloading oauth-apiserver/audit.log from ip-10-0-97-71.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:15.795729566Z INFO: Started downloading oauth-server/audit.log from ip-10-0-2-27.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:15.800422111Z INFO: Started downloading oauth-server/audit.log from ip-10-0-4-174.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:15.814556766Z INFO: Started downloading oauth-server/audit.log from ip-10-0-97-71.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:16.141909944Z INFO: Finished downloading oauth-server/audit.log from ip-10-0-2-27.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:16.185210242Z INFO: Finished downloading oauth-server/audit.log from ip-10-0-4-174.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:16.222574824Z INFO: Finished downloading oauth-server/audit.log from ip-10-0-97-71.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:16.300139039Z INFO: Finished downloading kube-apiserver/audit.log from ip-10-0-97-71.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:17.138330596Z INFO: Finished downloading kube-apiserver/audit.log from ip-10-0-2-27.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:17.596259083Z INFO: Finished downloading kube-apiserver/audit.log from ip-10-0-4-174.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:18.731225511Z INFO: Finished downloading kube-apiserver/audit-2025-11-27T05-27-57.703.log from ip-10-0-2-27.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:18.950501278Z INFO: Finished downloading kube-apiserver/audit-2025-11-27T05-48-18.587.log from ip-10-0-97-71.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:19.013956658Z INFO: Finished downloading kube-apiserver/audit-2025-11-27T05-16-50.237.log from ip-10-0-4-174.ec2.internal [must-gather-hv6rc] POD 2025-11-27T06:13:19.187452667Z Collecting logs from metrics server pod: metrics-server-75d7886b76-jlc9g [must-gather-hv6rc] POD 2025-11-27T06:13:19.343961010Z Collecting logs from metrics server pod: metrics-server-75d7886b76-kjk6g [must-gather-hv6rc] POD 2025-11-27T06:13:19.494863626Z INFO: Audit logs collected. [must-gather-hv6rc] OUT waiting for gather to complete [must-gather-hv6rc] OUT downloading gather output WARNING: rsync command not found in path. Please use your package manager to install it. [must-gather-hv6rc] OUT ./audit_logs/openshift-apiserver/ip-10-0-2-27.ec2.internal-audit.log.gz [must-gather-hv6rc] OUT ./audit_logs/openshift-apiserver/ip-10-0-4-174.ec2.internal-audit.log.gz [must-gather-hv6rc] OUT ./audit_logs/openshift-apiserver/ip-10-0-97-71.ec2.internal-audit.log.gz [must-gather-hv6rc] OUT ./audit_logs/openshift-apiserver.audit_logs_listing [must-gather-hv6rc] OUT ./audit_logs/kube-apiserver/ip-10-0-2-27.ec2.internal-audit-2025-11-27T05-27-57.703.log.gz [must-gather-hv6rc] OUT ./audit_logs/kube-apiserver/ip-10-0-2-27.ec2.internal-audit.log.gz [must-gather-hv6rc] OUT ./audit_logs/kube-apiserver/ip-10-0-4-174.ec2.internal-audit-2025-11-27T05-16-50.237.log.gz [must-gather-hv6rc] OUT ./audit_logs/kube-apiserver/ip-10-0-2-27.ec2.internal-termination.log.gz [must-gather-hv6rc] OUT ./audit_logs/kube-apiserver/ip-10-0-4-174.ec2.internal-audit.log.gz [must-gather-hv6rc] OUT ./audit_logs/kube-apiserver/ip-10-0-97-71.ec2.internal-audit-2025-11-27T05-48-18.587.log.gz [must-gather-hv6rc] OUT ./audit_logs/kube-apiserver/ip-10-0-4-174.ec2.internal-termination.log.gz [must-gather-hv6rc] OUT ./audit_logs/kube-apiserver/ip-10-0-97-71.ec2.internal-audit.log.gz [must-gather-hv6rc] OUT ./audit_logs/kube-apiserver/ip-10-0-97-71.ec2.internal-termination.log.gz [must-gather-hv6rc] OUT ./audit_logs/kube-apiserver.audit_logs_listing [must-gather-hv6rc] OUT ./audit_logs/oauth-apiserver/ip-10-0-4-174.ec2.internal-audit.log.gz [must-gather-hv6rc] OUT ./audit_logs/oauth-apiserver/ip-10-0-97-71.ec2.internal-audit.log.gz [must-gather-hv6rc] OUT ./audit_logs/oauth-apiserver/ip-10-0-2-27.ec2.internal-audit.log.gz [must-gather-hv6rc] OUT ./audit_logs/oauth-apiserver.audit_logs_listing [must-gather-hv6rc] OUT ./audit_logs/etcd.audit_logs_listing [must-gather-hv6rc] OUT ./audit_logs/oauth-server/ip-10-0-2-27.ec2.internal-audit.log.gz [must-gather-hv6rc] OUT ./audit_logs/oauth-server/ip-10-0-4-174.ec2.internal-audit.log.gz [must-gather-hv6rc] OUT ./audit_logs/oauth-server/ip-10-0-97-71.ec2.internal-audit.log.gz [must-gather-hv6rc] OUT ./audit_logs/oauth-server.audit_logs_listing [must-gather-hv6rc] OUT ./audit_logs/monitoring/metrics-server-75d7886b76-jlc9g/audit.log [must-gather-hv6rc] OUT ./audit_logs/monitoring/metrics-server-75d7886b76-kjk6g/audit.log Ignoring the following flags because they only apply to rsync: -z [must-gather ] OUT namespace/openshift-must-gather-69x2f deleted [must-gather ] OUT clusterrolebinding.rbac.authorization.k8s.io/must-gather-m9f4d deleted Reprinting Cluster State: When opening a support case, bugzilla, or issue please include the following summary data along with any other requested information: ClusterID: 29ce9b76-7a3c-446a-aac4-df4d9ae2eeee ClusterVersion: Stable at "4.21.0-0.nightly-2025-11-22-193140" ClusterOperators: All healthy and stable 66M must-gather.local.5234086108180928361 Thu Nov 27 06:13:22 UTC 2025 Attempting to collect kube API server log Starting to serve on 127.0.0.1:8001 * Trying ::1:8001... * connect to ::1 port 8001 failed: Connection refused * Trying 127.0.0.1:8001... * Connected to localhost (127.0.0.1) port 8001 (#0) > GET /logs/kube-apiserver.log HTTP/1.1 > Host: localhost:8001 > User-Agent: curl/7.76.1 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 404 Not Found < Audit-Id: 78783fda-a883-47d5-8685-1d0621385039 < Cache-Control: no-cache, private < Content-Length: 19 < Content-Type: text/plain; charset=utf-8 < Date: Thu, 27 Nov 2025 06:13:27 GMT < Strict-Transport-Security: max-age=31536000; includeSubDomains; preload < X-Content-Type-Options: nosniff < X-Kubernetes-Pf-Flowschema-Uid: 8a850610-c2c5-4ad6-9f0a-5a96bddf9323 < X-Kubernetes-Pf-Prioritylevel-Uid: eda9ab30-27a4-4724-910e-c35212d425c8 < { [19 bytes data] * Connection #0 to host localhost left intact Thu Nov 27 06:13:27 UTC 2025 Attempting to collect kube API server metrics 06:13:28: Running post command: ['tests/e2e/lib.sh', 'check_stackrox_logs', '/tmp/k8s-service-logs/part-1/k8s-logs'] INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/admission-control-d77f6dd-2qv6g_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/admission-control-d77f6dd-h8p6k_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/admission-control-d77f6dd-sn2ts_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/central-675967bb95-7rkvx_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/central-db-67998db698-txx99_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-46897_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-btw8k_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-f6grb_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-gtt9f_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-k2jf6_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/collector-vtrn9_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/config-controller-6d7c65f6b8-c8jh2_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/scanner-c854f7f8c-jdw9n_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/scanner-db-dd9d94d69-tkm8n_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/sensor-6d955c5b7c-llmc9_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/webhookserver-84f798856c-jjr55_object.json for OOMKilled INFO: Thu Nov 27 06:13:28 UTC 2025: Checking for unexplained restarts by stackrox pods INFO: Thu Nov 27 06:13:28 UTC 2025: Pod restarts were found ERROR: ERROR: Found at least one unexplained pod restart. Checking for a restart exception in: /tmp/k8s-service-logs/part-1/k8s-logs/stackrox/pods/config-controller-6d7c65f6b8-c8jh2-manager-previous.log This restart does not match any ignore patterns config-controller-6d7c65f6b8-c8jh2-manager-previous.log copied to Artifacts 06:13:29: Exception raised in ['tests/e2e/lib.sh', 'check_stackrox_logs', '/tmp/k8s-service-logs/part-1/k8s-logs'], Command '['tests/e2e/lib.sh', 'check_stackrox_logs', '/tmp/k8s-service-logs/part-1/k8s-logs']' returned non-zero exit status 1. 06:13:29: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', '/tmp/qa-part1-misc-logs', 'part-1/qa-part1-misc-logs'] INFO: Thu Nov 27 06:13:29 UTC 2025: Storing artifacts INFO: /tmp/qa-part1-misc-logs is missing, nothing to upload 06:13:29: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', '/tmp/collector-metrics', 'part-1/collector-metrics'] INFO: Thu Nov 27 06:13:29 UTC 2025: Storing artifacts INFO: Thu Nov 27 06:13:29 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.64.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Thu Nov 27 06:13:32 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/collector-metrics... 06:13:34: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', 'debug-dump', 'part-1/debug-dump'] INFO: Thu Nov 27 06:13:34 UTC 2025: Storing artifacts INFO: Thu Nov 27 06:13:34 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.64.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Thu Nov 27 06:13:38 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/debug-dump... 06:13:39: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', 'diagnostic-bundle', 'part-1/diagnostic-bundle'] INFO: Thu Nov 27 06:13:39 UTC 2025: Storing artifacts INFO: Thu Nov 27 06:13:39 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.64.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Thu Nov 27 06:13:43 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/diagnostic-bundle... 06:13:45: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', 'central-data', 'part-1/central-data'] INFO: Thu Nov 27 06:13:45 UTC 2025: Storing artifacts INFO: Thu Nov 27 06:13:45 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.64.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Thu Nov 27 06:13:48 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/central-data... 06:13:50: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', '/tmp/k8s-service-logs/part-1/k8s-logs', 'part-1/k8s-logs'] INFO: Thu Nov 27 06:13:50 UTC 2025: Storing artifacts INFO: Thu Nov 27 06:13:50 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.64.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Thu Nov 27 06:13:53 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs... 06:14:02: Post failure in: ['tests/e2e/lib.sh', 'check_stackrox_logs', '/tmp/k8s-service-logs/part-1/k8s-logs'] **** **** 06:14:02: ERROR: post test failed [Post failed: exit 1] [QA tests part I] **** **** **** 06:14:02: ERROR: run failed [Post failed: exit 1] [QA tests part I] **** **** **** 06:14:02: About to teardown **** **** **** 06:14:02: teardown completed **** **** **** 06:14:02: About to run final post **** 06:14:02: Running post command: ['scripts/ci/store-artifacts.sh', 'store_artifacts', '/tmp/qa-tests-backend-logs', 'final/qa-tests-backend-logs'] INFO: Thu Nov 27 06:14:02 UTC 2025: Storing artifacts INFO: Thu Nov 27 06:14:02 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.64.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Thu Nov 27 06:14:05 UTC 2025: Writing to gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/final/qa-tests-backend-logs... 06:14:07: Running post command: ['scripts/ci/store-artifacts.sh', 'fixup_artifacts_content_type'] INFO: Thu Nov 27 06:14:07 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.64.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/clusterserviceversions/rhacs-operator.v4.10.0-442-g3e9694559e_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/nodes/ip-10-0-122-153.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/nodes/ip-10-0-16-184.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/nodes/ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/nodes/ip-10-0-32-248.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/nodes/ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/nodes/ip-10-0-97-71.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/secrets/builder-dockercfg-fmw96_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/secrets/default-dockercfg-xxk6c_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/secrets/deployer-dockercfg-mntff_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/services/kubernetes_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/services/openshift_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/infrastructure/kube-apiserver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/default/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/nodes/ip-10-0-122-153.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/nodes/ip-10-0-16-184.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/kube-cloud-cfg_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/clusterserviceversions/rhacs-operator.v4.10.0-442-g3e9694559e_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/nodes/ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/nodes/ip-10-0-32-248.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/nodes/ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/nodes/ip-10-0-97-71.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/attachdetach-controller-dockercfg-9nvsh_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/aws-cloud-provider-dockercfg-dqp7x_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/aws-creds_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/builder-dockercfg-nz9k8_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/certificate-controller-dockercfg-k6wn2_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/cloud-controller-manager-dockercfg-npz2l_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/cronjob-controller-dockercfg-v6d67_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/default-dockercfg-9n86t_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/endpointslicemirroring-controller-dockercfg-p9bdv_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/clusterrole-aggregation-controller-dockercfg-tfvvr_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/daemon-set-controller-dockercfg-7ml47_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/kubeadmin_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/deployer-dockercfg-446rd_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/deployment-controller-dockercfg-df5w7_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/endpoint-controller-dockercfg-rv8tx_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/selinux-warning-controller-dockercfg-b5kqm_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/disruption-controller-dockercfg-g6659_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/expand-controller-dockercfg-7czz7_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/persistent-volume-binder-dockercfg-mnh84_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/ephemeral-volume-controller-dockercfg-vb5pd_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/pod-garbage-collector-dockercfg-6gq9k_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/endpointslice-controller-dockercfg-744ld_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/legacy-service-account-token-cleaner-dockercfg-mxqt4_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/replicaset-controller-dockercfg-rw76l_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/namespace-controller-dockercfg-9zbws_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/replication-controller-dockercfg-tbv28_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/service-ca-cert-publisher-dockercfg-l2488_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/pvc-protection-controller-dockercfg-8swbg_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/node-controller-dockercfg-8brcb_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/service-cidrs-controller-dockercfg-c8zz8_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/aws-cloud-provider_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/resourcequota-controller-dockercfg-wr22x_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/validatingadmissionpolicy-status-controller-dockercfg-xxv49_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/attachdetach-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/pv-protection-controller-dockercfg-52whk_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/volumeattributesclass-protection-controller-dockercfg-wj8rz_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/statefulset-controller-dockercfg-2gxhx_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/horizontal-pod-autoscaler-dockercfg-744r7_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/generic-garbage-collector-dockercfg-xwqkl_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/service-controller-dockercfg-7ssf8_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/root-ca-cert-publisher-dockercfg-48j54_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/service-account-controller-dockercfg-bc6m2_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/ttl-after-finished-controller-dockercfg-5qlkr_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/secrets/job-controller-dockercfg-sfvbt_describe.log... / [1/759 objects] 0% Done / [2/759 objects] 0% Done / [3/759 objects] 0% Done / [4/759 objects] 0% Done / [5/759 objects] 0% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/certificate-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/cloud-controller-manager_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/clusterrole-aggregation-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/cronjob-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/daemon-set-controller_describe.log... / [6/759 objects] 0% Done / [7/759 objects] 0% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/deployer_describe.log... / [8/759 objects] 1% Done / [9/759 objects] 1% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/deployment-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/disruption-controller_describe.log... / [10/759 objects] 1% Done / [11/759 objects] 1% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/endpoint-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/endpointslice-controller_describe.log... / [12/759 objects] 1% Done / [13/759 objects] 1% Done / [14/759 objects] 1% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/endpointslicemirroring-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/ephemeral-volume-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/expand-controller_describe.log... / [15/759 objects] 1% Done / [16/759 objects] 2% Done / [17/759 objects] 2% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/generic-garbage-collector_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/horizontal-pod-autoscaler_describe.log... / [18/759 objects] 2% Done / [19/759 objects] 2% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/job-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/legacy-service-account-token-cleaner_describe.log... / [20/759 objects] 2% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/namespace-controller_describe.log... / [21/759 objects] 2% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/node-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/persistent-volume-binder_describe.log... / [22/759 objects] 2% Done / [23/759 objects] 3% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/pod-garbage-collector_describe.log... / [24/759 objects] 3% Done / [25/759 objects] 3% Done / [26/759 objects] 3% Done / [27/759 objects] 3% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/pv-protection-controller_describe.log... / [28/759 objects] 3% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/pvc-protection-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/replicaset-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/replication-controller_describe.log... / [29/759 objects] 3% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/resourcequota-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/root-ca-cert-publisher_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/selinux-warning-controller_describe.log... / [30/759 objects] 3% Done / [31/759 objects] 4% Done / [32/759 objects] 4% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/service-account-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/service-ca-cert-publisher_describe.log... / [33/759 objects] 4% Done / [34/759 objects] 4% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/service-cidrs-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/service-controller_describe.log... / [35/759 objects] 4% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/statefulset-controller_describe.log... / [36/759 objects] 4% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/ttl-after-finished-controller_describe.log... / [37/759 objects] 4% Done / [38/759 objects] 5% Done / [39/759 objects] 5% Done / [40/759 objects] 5% Done / [41/759 objects] 5% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/validatingadmissionpolicy-status-controller_describe.log... / [42/759 objects] 5% Done / [43/759 objects] 5% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/serviceaccounts/volumeattributesclass-protection-controller_describe.log... / [44/759 objects] 5% Done / [45/759 objects] 5% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/services/kubelet_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... / [46/759 objects] 6% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [47/759 objects] 6% Done / [48/759 objects] 6% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/machine-api_describe.log... / [49/759 objects] 6% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... / [50/759 objects] 6% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/kube-system/validatingwebhookconfigurations/stackrox_describe.log... / [51/759 objects] 6% Done / [52/759 objects] 6% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/must-gather.local.5234086108180928361/quay-io-openshift-release-dev-ocp-v4-0-art-dev-sha256-698aa2e4879ec5cd5587bf1d5343931436659f7201f6f131d6d352966cdd5071/audit_logs/monitoring/metrics-server-75d7886b76-jlc9g/audit.log... / [53/759 objects] 6% Done / [54/759 objects] 7% Done / [55/759 objects] 7% Done / [56/759 objects] 7% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/must-gather.local.5234086108180928361/quay-io-openshift-release-dev-ocp-v4-0-art-dev-sha256-698aa2e4879ec5cd5587bf1d5343931436659f7201f6f131d6d352966cdd5071/audit_logs/monitoring/metrics-server-75d7886b76-kjk6g/audit.log... / [57/759 objects] 7% Done / [58/759 objects] 7% Done / [59/759 objects] 7% Done / [60/759 objects] 7% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/nodes/ip-10-0-122-153.ec2.internal_describe.log... / [61/759 objects] 8% Done / [62/759 objects] 8% Done / [63/759 objects] 8% Done / [64/759 objects] 8% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/nodes/ip-10-0-32-248.ec2.internal_describe.log... / [65/759 objects] 8% Done / [66/759 objects] 8% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/deployments/apiserver_describe.log... / [67/759 objects] 8% Done / [68/759 objects] 8% Done / [69/759 objects] 9% Done / [70/759 objects] 9% Done / [71/759 objects] 9% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/clusterserviceversions/rhacs-operator.v4.10.0-442-g3e9694559e_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/nodes/ip-10-0-16-184.ec2.internal_describe.log... / [72/759 objects] 9% Done / [73/759 objects] 9% Done / [74/759 objects] 9% Done / [75/759 objects] 9% Done / [76/759 objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/nodes/ip-10-0-97-71.ec2.internal_describe.log... / [77/759 objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/nodes/ip-10-0-2-27.ec2.internal_describe.log... / [78/759 objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-5c8fbcbd8d-c2kjb-openshift-apiserver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/nodes/ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-5c8fbcbd8d-ql5xg-openshift-apiserver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-5c8fbcbd8d-c2kjb_describe.log... / [79/759 objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-5c8fbcbd8d-ql5xg-openshift-apiserver-check-endpoints.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-5c8fbcbd8d-c2kjb-openshift-apiserver-check-endpoints.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-5c8fbcbd8d-ql5xg_describe.log... / [80/759 objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-5c8fbcbd8d-tsgtg-openshift-apiserver-check-endpoints.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-5c8fbcbd8d-tsgtg-openshift-apiserver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/secrets/deployer-dockercfg-kw2cd_describe.log... / [81/759 objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/secrets/etcd-client_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/secrets/default-dockercfg-99ddb_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/pods/apiserver-5c8fbcbd8d-tsgtg_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/secrets/serving-cert_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/secrets/builder-dockercfg-8zlqh_describe.log... / [82/759 objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/secrets/openshift-apiserver-sa-dockercfg-hfjm4_describe.log... / [83/759 objects] 10% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/serviceaccounts/builder_describe.log... / [84/759 objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/serviceaccounts/default_describe.log... / [85/759 objects] 11% Done / [86/759 objects] 11% Done / [87/759 objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/serviceaccounts/openshift-apiserver-sa_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/services/api_describe.log... / [88/759 objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/services/check-endpoints_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... / [89/759 objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [90/759 objects] 11% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... / [91/759 objects] 11% Done / [92/759 objects] 12% Done / [93/759 objects] 12% Done / [94/759 objects] 12% Done / [95/759 objects] 12% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-apiserver/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/clusterserviceversions/rhacs-operator.v4.10.0-442-g3e9694559e_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/nodes/ip-10-0-122-153.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/deployments/oauth-openshift_describe.log... / [96/759 objects] 12% Done / [97/759 objects] 12% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/nodes/ip-10-0-16-184.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/nodes/ip-10-0-2-27.ec2.internal_describe.log... / [98/759 objects] 12% Done / [99/759 objects] 13% Done / [100/759 objects] 13% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/nodes/ip-10-0-32-248.ec2.internal_describe.log... / [101/759 objects] 13% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/nodes/ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/nodes/ip-10-0-97-71.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/pods/oauth-openshift-97f8b756b-n28z4-oauth-openshift.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/pods/oauth-openshift-97f8b756b-n28z4_describe.log... / [102/759 objects] 13% Done / [103/759 objects] 13% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/pods/oauth-openshift-97f8b756b-xr7ds-oauth-openshift.log... / [104/759 objects] 13% Done / [105/759 objects] 13% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/pods/oauth-openshift-97f8b756b-xr7ds_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/pods/oauth-openshift-97f8b756b-zh4v8-oauth-openshift.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/pods/oauth-openshift-97f8b756b-zh4v8_describe.log... / [106/759 objects] 13% Done / [107/759 objects] 14% Done / [108/759 objects] 14% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/builder-dockercfg-9xhfc_describe.log... / [109/759 objects] 14% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/default-dockercfg-28bzx_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/deployer-dockercfg-zlq4m_describe.log... / [110/759 objects] 14% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/oauth-openshift-dockercfg-p8jtv_describe.log... / [111/759 objects] 14% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/v4-0-config-system-ocp-branding-template_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/v4-0-config-system-router-certs_describe.log... / [112/759 objects] 14% Done / [113/759 objects] 14% Done / [114/759 objects] 15% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/v4-0-config-system-serving-cert_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/secrets/v4-0-config-system-session_describe.log... / [115/759 objects] 15% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/serviceaccounts/default_describe.log... / [116/759 objects] 15% Done / [117/759 objects] 15% Done / [118/759 objects] 15% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/serviceaccounts/oauth-openshift_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/services/oauth-openshift_describe.log... / [119/759 objects] 15% Done / [120/759 objects] 15% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... / [121/759 objects] 15% Done / [122/759 objects] 16% Done / [123/759 objects] 16% Done / [124/759 objects] 16% Done / [125/759 objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... / [126/759 objects] 16% Done / [127/759 objects] 16% Done / [128/759 objects] 16% Done / [129/759 objects] 16% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [130/759 objects] 17% Done / [131/759 objects] 17% Done / [132/759 objects] 17% Done / [133/759 objects] 17% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... / [134/759 objects] 17% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [135/759 objects] 17% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/deployments/controller-manager_describe.log... / [136/759 objects] 17% Done / [137/759 objects] 18% Done / [138/759 objects] 18% Done / [139/759 objects] 18% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/nodes/ip-10-0-122-153.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-authentication/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/clusterserviceversions/rhacs-operator.v4.10.0-442-g3e9694559e_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/nodes/ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/nodes/ip-10-0-16-184.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/nodes/ip-10-0-32-248.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/nodes/ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/nodes/ip-10-0-97-71.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/pods/controller-manager-6bbb77bc8b-2nh44-controller-manager.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/pods/controller-manager-6bbb77bc8b-2nh44_describe.log... / [140/759 objects] 18% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/pods/controller-manager-6bbb77bc8b-cphff-controller-manager.log... / [141/759 objects] 18% Done / [142/759 objects] 18% Done / [143/759 objects] 18% Done / [144/759 objects] 18% Done / [145/759 objects] 19% Done / [146/759 objects] 19% Done / [147/759 objects] 19% Done / [148/759 objects] 19% Done / [149/759 objects] 19% Done / [150/759 objects] 19% Done / [151/759 objects] 19% Done / [152/759 objects] 20% Done / [153/759 objects] 20% Done / [154/759 objects] 20% Done / [155/759 objects] 20% Done / [156/759 objects] 20% Done / [157/759 objects] 20% Done / [158/759 objects] 20% Done / [159/759 objects] 20% Done / [160/759 objects] 21% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/pods/controller-manager-6bbb77bc8b-cphff_describe.log... / [161/759 objects] 21% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/pods/controller-manager-6bbb77bc8b-pjn56_describe.log... / [162/759 objects] 21% Done / [163/759 objects] 21% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... / [164/759 objects] 21% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/pods/controller-manager-6bbb77bc8b-pjn56-controller-manager.log... / [165/759 objects] 21% Done / [166/759 objects] 21% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/secrets/builder-dockercfg-257zl_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/serviceaccounts/default_describe.log... / [167/759 objects] 22% Done / [168/759 objects] 22% Done / [169/759 objects] 22% Done / [170/759 objects] 22% Done / [171/759 objects] 22% Done / [172/759 objects] 22% Done / [173/759 objects] 22% Done / [174/759 objects] 22% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... / [175/759 objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/services/controller-manager_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/secrets/default-dockercfg-g457c_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/secrets/deployer-dockercfg-mkc9l_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/secrets/openshift-controller-manager-sa-dockercfg-mpl55_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/secrets/serving-cert_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/serviceaccounts/openshift-controller-manager-sa_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/serviceaccounts/builder_describe.log... / [176/759 objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [177/759 objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/clusterserviceversions/rhacs-operator.v4.10.0-442-g3e9694559e_describe.log... / [178/759 objects] 23% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-controller-manager/validatingwebhookconfigurations/stackrox_describe.log... / [179/759 objects] 23% Done / [180/759 objects] 23% Done / [181/759 objects] 23% Done / [182/759 objects] 23% Done / [183/759 objects] 24% Done / [184/759 objects] 24% Done / [185/759 objects] 24% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/nodes/ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/daemonsets/node-resolver_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/daemonsets/dns-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/nodes/ip-10-0-122-153.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/nodes/ip-10-0-16-184.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/nodes/ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-7gffp-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/nodes/ip-10-0-32-248.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/nodes/ip-10-0-97-71.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-7gffp-dns.log... / [186/759 objects] 24% Done / [187/759 objects] 24% Done / [188/759 objects] 24% Done / [189/759 objects] 24% Done / [190/759 objects] 25% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-7gffp_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-8vhwj-dns.log... / [191/759 objects] 25% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-8vhwj_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-kq55h_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-kq55h-dns.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-8vhwj-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-pv7zh-dns.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-pv7zh-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-pv7zh_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-kq55h-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-qnf4x-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-vmnb5-dns.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-qnf4x-dns.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-qnf4x_describe.log... / [192/759 objects] 25% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-vmnb5-kube-rbac-proxy.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/dns-default-vmnb5_describe.log... / [193/759 objects] 25% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-dbsxs-dns-node-resolver.log... / [194/759 objects] 25% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-dbsxs_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-dh9kf-dns-node-resolver.log... / [195/759 objects] 25% Done / [196/759 objects] 25% Done / [197/759 objects] 25% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-dh9kf_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-gqcw8_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-gqcw8-dns-node-resolver.log... / [198/759 objects] 26% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-ncrz7-dns-node-resolver.log... / [199/759 objects] 26% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-ncrz7_describe.log... / [200/759 objects] 26% Done / [201/759 objects] 26% Done / [202/759 objects] 26% Done / [203/759 objects] 26% Done / [204/759 objects] 26% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-rdxvn-dns-node-resolver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-rdxvn_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-s78sw-dns-node-resolver.log... / [205/759 objects] 27% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/pods/node-resolver-s78sw_describe.log... / [206/759 objects] 27% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/secrets/builder-dockercfg-tjznb_describe.log... / [207/759 objects] 27% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/secrets/default-dockercfg-dgff6_describe.log... / [208/759 objects] 27% Done / [209/759 objects] 27% Done / [210/759 objects] 27% Done / [211/759 objects] 27% Done / [212/759 objects] 27% Done / [213/759 objects] 28% Done / [214/759 objects] 28% Done / [215/759 objects] 28% Done / [216/759 objects] 28% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/secrets/deployer-dockercfg-z9t4z_describe.log... / [217/759 objects] 28% Done / [218/759 objects] 28% Done / [219/759 objects] 28% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/secrets/dns-dockercfg-zk8jp_describe.log... / [220/759 objects] 28% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/secrets/node-resolver-dockercfg-mcmcr_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/secrets/dns-default-metrics-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/services/dns-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/serviceaccounts/dns_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/serviceaccounts/node-resolver_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/machine-api_describe.log... / [221/759 objects] 29% Done / [222/759 objects] 29% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [223/759 objects] 29% Done / [224/759 objects] 29% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [225/759 objects] 29% Done / [226/759 objects] 29% Done / [227/759 objects] 29% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-dns/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/clusterserviceversions/rhacs-operator.v4.10.0-442-g3e9694559e_describe.log... / [228/759 objects] 30% Done / [229/759 objects] 30% Done / [230/759 objects] 30% Done / [231/759 objects] 30% Done / [232/759 objects] 30% Done / [233/759 objects] 30% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/nodes/ip-10-0-122-153.ec2.internal_describe.log... / [234/759 objects] 30% Done / [235/759 objects] 30% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/nodes/ip-10-0-2-27.ec2.internal_describe.log... / [236/759 objects] 31% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/nodes/ip-10-0-16-184.ec2.internal_describe.log... / [237/759 objects] 31% Done / [238/759 objects] 31% Done / [239/759 objects] 31% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/nodes/ip-10-0-4-174.ec2.internal_describe.log... / [240/759 objects] 31% Done / [241/759 objects] 31% Done / [242/759 objects] 31% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/nodes/ip-10-0-97-71.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/nodes/ip-10-0-32-248.ec2.internal_describe.log... / [243/759 objects] 32% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-guard-ip-10-0-2-27.ec2.internal_describe.log... / [244/759 objects] 32% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-guard-ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-guard-ip-10-0-97-71.ec2.internal_describe.log... / [245/759 objects] 32% Done / [246/759 objects] 32% Done / [247/759 objects] 32% Done / [248/759 objects] 32% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-2-27.ec2.internal-etcd-metrics.log... / [249/759 objects] 32% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-2-27.ec2.internal-etcd-rev.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-2-27.ec2.internal-etcd-readyz.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-2-27.ec2.internal-etcd.log... / [250/759 objects] 32% Done / [251/759 objects] 33% Done / [252/759 objects] 33% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-2-27.ec2.internal-setup.log... / [253/759 objects] 33% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-2-27.ec2.internal_describe.log... / [254/759 objects] 33% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-4-174.ec2.internal-etcd-metrics.log... / [255/759 objects] 33% Done / [256/759 objects] 33% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-4-174.ec2.internal-etcd-readyz.log... / [257/759 objects] 33% Done / [258/759 objects] 33% Done / [259/759 objects] 34% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-4-174.ec2.internal-setup.log... / [260/759 objects] 34% Done / [261/759 objects] 34% Done / [262/759 objects] 34% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-4-174.ec2.internal-etcd-rev.log... / [263/759 objects] 34% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-97-71.ec2.internal-etcd-readyz.log... / [264/759 objects] 34% Done / [265/759 objects] 34% Done / [266/759 objects] 35% Done / [267/759 objects] 35% Done / [268/759 objects] 35% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-4-174.ec2.internal-etcd.log... / [269/759 objects] 35% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-97-71.ec2.internal-etcd-rev.log... / [270/759 objects] 35% Done / [271/759 objects] 35% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-97-71.ec2.internal_describe.log... / [272/759 objects] 35% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-97-71.ec2.internal-etcd.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-97-71.ec2.internal-etcd-metrics.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/etcd-ip-10-0-97-71.ec2.internal-setup.log... / [273/759 objects] 35% Done / [274/759 objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-5-ip-10-0-97-71.ec2.internal_describe.log... / [275/759 objects] 36% Done / [276/759 objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-5-ip-10-0-97-71.ec2.internal-installer.log... / [277/759 objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-2-27.ec2.internal-installer.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-4-174.ec2.internal-installer.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-97-71.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-2-27.ec2.internal-installer.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-4-174.ec2.internal-installer.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-7-ip-10-0-97-71.ec2.internal-installer.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-97-71.ec2.internal-installer.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/installer-8-ip-10-0-97-71.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-2-27.ec2.internal-pruner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-4-174.ec2.internal-pruner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-97-71.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-7-ip-10-0-97-71.ec2.internal-pruner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-2-27.ec2.internal-pruner.log... / [278/759 objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-4-174.ec2.internal-pruner.log... / [279/759 objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-4-174.ec2.internal_describe.log... / [280/759 objects] 36% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-97-71.ec2.internal-pruner.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/pods/revision-pruner-8-ip-10-0-97-71.ec2.internal_describe.log... / [281/759 objects] 37% Done / [282/759 objects] 37% Done / [283/759 objects] 37% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/builder-dockercfg-m2s29_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/default-dockercfg-7t8qz_describe.log... / [284/759 objects] 37% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/deployer-dockercfg-bdn92_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-all-certs-4_describe.log... / [285/759 objects] 37% Done / [286/759 objects] 37% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-all-certs-5_describe.log... / [287/759 objects] 37% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-all-certs-6_describe.log... / [288/759 objects] 37% Done / [289/759 objects] 38% Done / [290/759 objects] 38% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-all-certs-7_describe.log... / [291/759 objects] 38% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-all-certs-8_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-all-certs_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-backup-sa-dockercfg-zxzgj_describe.log... / [292/759 objects] 38% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-client_describe.log... / [293/759 objects] 38% Done / [294/759 objects] 38% Done / [295/759 objects] 38% Done / [296/759 objects] 38% Done / [297/759 objects] 39% Done / [298/759 objects] 39% Done / [299/759 objects] 39% Done / [300/759 objects] 39% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-peer-ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-peer-ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-peer-ip-10-0-97-71.ec2.internal_describe.log... / [301/759 objects] 39% Done / [302/759 objects] 39% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-metric-signer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-metric-client_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-peer-ip-10-0-133-35_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-sa-dockercfg-b52cp_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-ip-10-0-133-35_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-ip-10-0-97-71.ec2.internal_describe.log... / [303/759 objects] 39% Done / [304/759 objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-metrics-ip-10-0-133-35_describe.log... / [305/759 objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-metrics-ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-metrics-ip-10-0-4-174.ec2.internal_describe.log... / [306/759 objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-serving-metrics-ip-10-0-97-71.ec2.internal_describe.log... / [307/759 objects] 40% Done / [308/759 objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/etcd-signer_describe.log... / [309/759 objects] 40% Done / [310/759 objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/installer-sa-dockercfg-bp5x2_describe.log... / [311/759 objects] 40% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/secrets/serving-cert_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/serviceaccounts/default_describe.log... / [312/759 objects] 41% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/serviceaccounts/deployer_describe.log... / [313/759 objects] 41% Done / [314/759 objects] 41% Done / [315/759 objects] 41% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/serviceaccounts/etcd-backup-sa_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/serviceaccounts/etcd-sa_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/serviceaccounts/installer-sa_describe.log... / [316/759 objects] 41% Done / [317/759 objects] 41% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/services/etcd_describe.log... / [318/759 objects] 41% Done / [319/759 objects] 42% Done / [320/759 objects] 42% Done / [321/759 objects] 42% Done / [322/759 objects] 42% Done / [323/759 objects] 42% Done / [324/759 objects] 42% Done / [325/759 objects] 42% Done / [326/759 objects] 42% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... / [327/759 objects] 43% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... / [328/759 objects] 43% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-etcd/validatingwebhookconfigurations/stackrox_describe.log... / [329/759 objects] 43% Done / [330/759 objects] 43% Done / [331/759 objects] 43% Done / [332/759 objects] 43% Done / [333/759 objects] 43% Done / [334/759 objects] 44% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/clusterserviceversions/rhacs-operator.v4.10.0-442-g3e9694559e_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/deployments/router-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/nodes/ip-10-0-122-153.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/nodes/ip-10-0-16-184.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/nodes/ip-10-0-4-174.ec2.internal_describe.log... / [335/759 objects] 44% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/nodes/ip-10-0-2-27.ec2.internal_describe.log... / [336/759 objects] 44% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/nodes/ip-10-0-32-248.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/nodes/ip-10-0-97-71.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/pods/router-default-8675f74d77-5txgz-router-prev-success.log... / [337/759 objects] 44% Done / [338/759 objects] 44% Done / [339/759 objects] 44% Done / [340/759 objects] 44% Done / [341/759 objects] 44% Done / [342/759 objects] 45% Done / [343/759 objects] 45% Done / [344/759 objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/pods/router-default-8675f74d77-5txgz-router.log... / [345/759 objects] 45% Done / [346/759 objects] 45% Done / [347/759 objects] 45% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/pods/router-default-8675f74d77-5txgz_describe.log... / [348/759 objects] 45% Done / [349/759 objects] 45% Done / [350/759 objects] 46% Done / [351/759 objects] 46% Done / [352/759 objects] 46% Done / [353/759 objects] 46% Done / [354/759 objects] 46% Done / [355/759 objects] 46% Done / [356/759 objects] 46% Done / [357/759 objects] 47% Done / [358/759 objects] 47% Done / [359/759 objects] 47% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/builder-dockercfg-6ld96_describe.log... / [360/759 objects] 47% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/default-dockercfg-fkbvg_describe.log... / [361/759 objects] 47% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/pods/router-default-8675f74d77-ppnmq-router-prev-success.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/pods/router-default-8675f74d77-ppnmq_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/router-certs-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/router-metrics-certs-default_describe.log... / [362/759 objects] 47% Done / [363/759 objects] 47% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/pods/router-default-8675f74d77-ppnmq-router.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/services/router-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/deployer-dockercfg-kv7q8_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/router-dockercfg-sbbkn_describe.log... / [364/759 objects] 47% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/serviceaccounts/router_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/services/router-internal-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/secrets/router-stats-default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... / [365/759 objects] 48% Done / [366/759 objects] 48% Done / [367/759 objects] 48% Done / [368/759 objects] 48% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-ingress/validatingwebhookconfigurations/stackrox_describe.log... / [369/759 objects] 48% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/catalogsources/certified-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/catalogsources/community-operators_describe.log... / [370/759 objects] 48% Done / [371/759 objects] 48% Done / [372/759 objects] 49% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/catalogsources/redhat-marketplace_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/catalogsources/redhat-operators_describe.log... / [373/759 objects] 49% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/clusterserviceversions/rhacs-operator.v4.10.0-442-g3e9694559e_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/deployments/marketplace-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/nodes/ip-10-0-122-153.ec2.internal_describe.log... / [374/759 objects] 49% Done / [375/759 objects] 49% Done / [376/759 objects] 49% Done / [377/759 objects] 49% Done / [378/759 objects] 49% Done / [379/759 objects] 49% Done / [380/759 objects] 50% Done / [381/759 objects] 50% Done / [382/759 objects] 50% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/nodes/ip-10-0-16-184.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/nodes/ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/nodes/ip-10-0-97-71.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/community-operators-jf4xt-registry-server.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/community-operators-jf4xt_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/marketplace-operator-6c8bf594c6-m6rdw-marketplace-operator-prev-success.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/nodes/ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/certified-operators-vhcjn_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/nodes/ip-10-0-32-248.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/certified-operators-vhcjn-registry-server.log... / [383/759 objects] 50% Done / [384/759 objects] 50% Done / [385/759 objects] 50% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/marketplace-operator-6c8bf594c6-m6rdw-marketplace-operator.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/marketplace-operator-6c8bf594c6-m6rdw_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/redhat-marketplace-nf4cc-registry-server.log... / [386/759 objects] 50% Done / [387/759 objects] 50% Done / [388/759 objects] 51% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/redhat-marketplace-nf4cc_describe.log... / [389/759 objects] 51% Done / [390/759 objects] 51% Done / [391/759 objects] 51% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/redhat-operators-kwkx7-registry-server.log... / [392/759 objects] 51% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/pods/redhat-operators-kwkx7_describe.log... / [393/759 objects] 51% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/builder-dockercfg-tmg68_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/certified-operators-dockercfg-p6lvh_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/community-operators-dockercfg-d8pr6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/default-dockercfg-sbxgt_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/deployer-dockercfg-qgm8x_describe.log... / [394/759 objects] 51% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/marketplace-operator-dockercfg-5skwr_describe.log... / [395/759 objects] 52% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/marketplace-operator-metrics_describe.log... / [396/759 objects] 52% Done / [397/759 objects] 52% Done / [398/759 objects] 52% Done / [399/759 objects] 52% Done / [400/759 objects] 52% Done / [401/759 objects] 52% Done / [402/759 objects] 52% Done / [403/759 objects] 53% Done / [404/759 objects] 53% Done / [405/759 objects] 53% Done / [406/759 objects] 53% Done / [407/759 objects] 53% Done / [408/759 objects] 53% Done / [409/759 objects] 53% Done / [410/759 objects] 54% Done / [411/759 objects] 54% Done / [412/759 objects] 54% Done / [413/759 objects] 54% Done / [414/759 objects] 54% Done / [415/759 objects] 54% Done / [416/759 objects] 54% Done / [417/759 objects] 54% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/certified-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/services/marketplace-operator-metrics_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/redhat-marketplace-dockercfg-zfs8j_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/redhat-marketplace_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/community-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/services/certified-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/services/community-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/services/redhat-marketplace_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/secrets/redhat-operators-dockercfg-tj89s_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/marketplace-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/services/redhat-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/serviceaccounts/redhat-operators_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/machine-api_describe.log... / [418/759 objects] 55% Done / [419/759 objects] 55% Done / [420/759 objects] 55% Done / [421/759 objects] 55% Done / [422/759 objects] 55% Done / [423/759 objects] 55% Done / [424/759 objects] 55% Done / [425/759 objects] 55% Done / [426/759 objects] 56% Done / [427/759 objects] 56% Done / [428/759 objects] 56% Done / [429/759 objects] 56% Done / [430/759 objects] 56% Done / [431/759 objects] 56% Done / [432/759 objects] 56% Done / [433/759 objects] 57% Done / [434/759 objects] 57% Done / [435/759 objects] 57% Done / [436/759 objects] 57% Done / [437/759 objects] 57% Done / [438/759 objects] 57% Done / [439/759 objects] 57% Done / [440/759 objects] 57% Done / [441/759 objects] 58% Done / [442/759 objects] 58% Done / [443/759 objects] 58% Done / [444/759 objects] 58% Done / [445/759 objects] 58% Done / [446/759 objects] 58% Done / [447/759 objects] 58% Done / [448/759 objects] 59% Done / [449/759 objects] 59% Done / [450/759 objects] 59% Done / [451/759 objects] 59% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/nodes/ip-10-0-16-184.ec2.internal_describe.log... / [452/759 objects] 59% Done / [453/759 objects] 59% Done / [454/759 objects] 59% Done / [455/759 objects] 59% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [456/759 objects] 60% Done / [457/759 objects] 60% Done / [458/759 objects] 60% Done / [459/759 objects] 60% Done / [460/759 objects] 60% Done / [461/759 objects] 60% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... / [462/759 objects] 60% Done / [463/759 objects] 61% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/stackrox_describe.log... / [464/759 objects] 61% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/clusterserviceversions/rhacs-operator.v4.10.0-442-g3e9694559e_describe.log... / [465/759 objects] 61% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-bmlgn-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/openshift-marketplace/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... / [466/759 objects] 61% Done / [467/759 objects] 61% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/nodes/ip-10-0-4-174.ec2.internal_describe.log... / [468/759 objects] 61% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-4lljr-prefetch.log... / [469/759 objects] 61% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/nodes/ip-10-0-122-153.ec2.internal_describe.log... / [470/759 objects] 61% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/deployments/stackrox-images-metrics_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/daemonsets/qa-e2e_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/daemonsets/stackrox-images_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/deployments/qa-e2e-metrics_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/nodes/ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/nodes/ip-10-0-32-248.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-cqk8d-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-4lljr-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/nodes/ip-10-0-97-71.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-bmlgn_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-5p5p2-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-bmlgn-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-cqk8d_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-stdhn-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-metrics-7fdf959548-j4c5c-aggregator.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-metrics-7fdf959548-j4c5c_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-n7m2z-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-4lljr_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-n7m2z_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-5p5p2_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-5p5p2-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-n7m2z-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-cqk8d-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-stdhn-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/qa-e2e-stdhn_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-2qwf5-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-2qwf5-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-2qwf5_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-768x7-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-768x7-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-9wxjx-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-9wxjx-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-768x7_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-9wxjx_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-czhv7-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-czhv7-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-czhv7_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-gpl58-prefetch.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-gpl58_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-gpl58-sleep.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-metrics-8d848757-sdzt5-aggregator.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-metrics-8d848757-sdzt5_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-wwz4z-prefetch.log... / [471/759 objects] 62% Done / [472/759 objects] 62% Done / [473/759 objects] 62% Done / [474/759 objects] 62% Done / [475/759 objects] 62% Done / [476/759 objects] 62% Done / [477/759 objects] 62% Done / [478/759 objects] 62% Done / [479/759 objects] 63% Done / [480/759 objects] 63% Done / [481/759 objects] 63% Done / [482/759 objects] 63% Done / [483/759 objects] 63% Done / [484/759 objects] 63% Done / [485/759 objects] 63% Done / [486/759 objects] 64% Done / [487/759 objects] 64% Done / [488/759 objects] 64% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-wwz4z-sleep.log... / [489/759 objects] 64% Done / [490/759 objects] 64% Done / [491/759 objects] 64% Done / [492/759 objects] 64% Done / [493/759 objects] 64% Done / [494/759 objects] 65% Done / [495/759 objects] 65% Done / [496/759 objects] 65% Done / [497/759 objects] 65% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/pods/stackrox-images-wwz4z_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/secrets/default-dockercfg-mrzlm_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/secrets/deployer-dockercfg-lpwg2_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/secrets/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/secrets/builder-dockercfg-dcqvp_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/services/stackrox-images-metrics_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/services/qa-e2e-metrics_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/catalogsources/stackrox-operator-test-index_describe.log... / [498/759 objects] 65% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/prefetch-images/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/clusterserviceversions/rhacs-operator.v4.10.0-442-g3e9694559e_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/nodes/ip-10-0-122-153.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/deployments/rhacs-operator-controller-manager_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/nodes/ip-10-0-16-184.ec2.internal_describe.log... / [499/759 objects] 65% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/nodes/ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/nodes/ip-10-0-32-248.ec2.internal_describe.log... / [500/759 objects] 65% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/nodes/ip-10-0-4-174.ec2.internal_describe.log... / [501/759 objects] 66% Done / [502/759 objects] 66% Done / [503/759 objects] 66% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/nodes/ip-10-0-97-71.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/2d37771064b7eff82d479204d0da22c78d0e6f703001cda4886c85f454lz59c-extract.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/2d37771064b7eff82d479204d0da22c78d0e6f703001cda4886c85f454lz59c-pull.log... / [504/759 objects] 66% Done / [505/759 objects] 66% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/2d37771064b7eff82d479204d0da22c78d0e6f703001cda4886c85f454lz59c-util.log... / [506/759 objects] 66% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/2d37771064b7eff82d479204d0da22c78d0e6f703001cda4886c85f454lz59c_describe.log... / [507/759 objects] 66% Done / [508/759 objects] 66% Done / [509/759 objects] 67% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/rhacs-operator-controller-manager-6647c56f86-wf2mk-manager.log... / [510/759 objects] 67% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/rhacs-operator-controller-manager-6647c56f86-wf2mk_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/stackrox-operator-test-index-95jpb-registry-server.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/pods/stackrox-operator-test-index-95jpb_describe.log... / [511/759 objects] 67% Done / [512/759 objects] 67% Done / [513/759 objects] 67% Done / [514/759 objects] 67% Done / [515/759 objects] 67% Done / [516/759 objects] 67% Done / [517/759 objects] 68% Done / [518/759 objects] 68% Done / [519/759 objects] 68% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/secrets/builder-dockercfg-54v59_describe.log... / [520/759 objects] 68% Done / [521/759 objects] 68% Done / [522/759 objects] 68% Done / [523/759 objects] 68% Done / [524/759 objects] 69% Done / [525/759 objects] 69% Done / [526/759 objects] 69% Done / [527/759 objects] 69% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/secrets/default-dockercfg-szgs9_describe.log... / [528/759 objects] 69% Done / [529/759 objects] 69% Done / [530/759 objects] 69% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/secrets/deployer-dockercfg-8jdrg_describe.log... / [531/759 objects] 69% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/secrets/rhacs-operator-controller-manager-dockercfg-7h4sl_describe.log... / [532/759 objects] 70% Done / [533/759 objects] 70% Done / [534/759 objects] 70% Done / [535/759 objects] 70% Done / [536/759 objects] 70% Done / [537/759 objects] 70% Done / [538/759 objects] 70% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/secrets/stackrox-operator-test-index-dockercfg-g2v28_describe.log... / [539/759 objects] 71% Done / [540/759 objects] 71% Done / [541/759 objects] 71% Done / [542/759 objects] 71% Done / [543/759 objects] 71% Done / [544/759 objects] 71% Done / [545/759 objects] 71% Done / [546/759 objects] 71% Done / [547/759 objects] 72% Done / [548/759 objects] 72% Done / [549/759 objects] 72% Done / [550/759 objects] 72% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/services/rhacs-operator-controller-manager-metrics-service_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/subscriptions/stackrox-operator-test-subscription_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/services/stackrox-operator-test-index_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/serviceaccounts/stackrox-operator-test-index_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/serviceaccounts/rhacs-operator-controller-manager_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/multus.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/central/stackrox-central-services_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/clusterserviceversions/rhacs-operator.v4.10.0-442-g3e9694559e_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/config-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/stackrox_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/daemonsets/collector_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/admission-control_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/webhookserver_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/scanner-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/central-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/deployments/central_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox-operator/validatingwebhookconfigurations/performance-addon-operator_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/nodes/ip-10-0-122-153.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/nodes/ip-10-0-16-184.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/nodes/ip-10-0-4-174.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/nodes/ip-10-0-2-27.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/nodes/ip-10-0-32-248.ec2.internal_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/nodes/ip-10-0-97-71.ec2.internal_describe.log... / [551/759 objects] 72% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-d77f6dd-2qv6g-admission-control.log... / [552/759 objects] 72% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-d77f6dd-2qv6g-init-tls-certs.log... / [553/759 objects] 72% Done / [554/759 objects] 72% Done / [555/759 objects] 73% Done / [556/759 objects] 73% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-d77f6dd-2qv6g_describe.log... / [557/759 objects] 73% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-d77f6dd-h8p6k-admission-control.log... / [558/759 objects] 73% Done / [559/759 objects] 73% Done / [560/759 objects] 73% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-d77f6dd-h8p6k-init-tls-certs.log... / [561/759 objects] 73% Done / [562/759 objects] 74% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-d77f6dd-h8p6k_describe.log... / [563/759 objects] 74% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-d77f6dd-sn2ts-admission-control.log... / [564/759 objects] 74% Done / [565/759 objects] 74% Done / [566/759 objects] 74% Done / [567/759 objects] 74% Done / [568/759 objects] 74% Done / [569/759 objects] 74% Done / [570/759 objects] 75% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/central-675967bb95-7rkvx-central.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/central-675967bb95-7rkvx_describe.log... / [571/759 objects] 75% Done / [572/759 objects] 75% Done / [573/759 objects] 75% Done / [574/759 objects] 75% Done / [575/759 objects] 75% Done / [576/759 objects] 75% Done / [577/759 objects] 76% Done / [578/759 objects] 76% Done / [579/759 objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-d77f6dd-sn2ts-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/central-db-67998db698-txx99-central-db.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/admission-control-d77f6dd-sn2ts_describe.log... / [580/759 objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/central-db-67998db698-txx99-init-db.log... / [581/759 objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-btw8k-compliance.log... / [582/759 objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-46897-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-btw8k-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/central-db-67998db698-txx99_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-46897-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-btw8k-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-46897-init-tls-certs.log... / [583/759 objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-46897-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-btw8k-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-46897_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-f6grb-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-f6grb-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-f6grb_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-f6grb-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-f6grb-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-btw8k_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-gtt9f-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-gtt9f-compliance.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-gtt9f-init-tls-certs.log... / [584/759 objects] 76% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-gtt9f-node-inventory.log... / [585/759 objects] 77% Done / [586/759 objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-gtt9f_describe.log... / [587/759 objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-k2jf6-collector.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-k2jf6-compliance.log... / [588/759 objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-k2jf6-init-tls-certs.log... / [589/759 objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-k2jf6-node-inventory.log... / [590/759 objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-k2jf6_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-vtrn9-collector.log... / [591/759 objects] 77% Done / [592/759 objects] 77% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-vtrn9-compliance.log... / [593/759 objects] 78% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-vtrn9-init-tls-certs.log... / [594/759 objects] 78% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-vtrn9-node-inventory.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/collector-vtrn9_describe.log... / [595/759 objects] 78% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/config-controller-6d7c65f6b8-c8jh2-manager-previous.log... / [596/759 objects] 78% Done / [597/759 objects] 78% Done / [598/759 objects] 78% Done / [599/759 objects] 78% Done / [600/759 objects] 79% Done / [601/759 objects] 79% Done / [602/759 objects] 79% Done / [603/759 objects] 79% Done / [604/759 objects] 79% Done / [605/759 objects] 79% Done / [606/759 objects] 79% Done / [607/759 objects] 79% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/config-controller-6d7c65f6b8-c8jh2_describe.log... / [608/759 objects] 80% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/scanner-c854f7f8c-jdw9n-scanner.log... / [609/759 objects] 80% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/config-controller-6d7c65f6b8-c8jh2-manager.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/scanner-db-dd9d94d69-tkm8n-db.log... / [610/759 objects] 80% Done / [611/759 objects] 80% Done / [612/759 objects] 80% Done / [613/759 objects] 80% Done / [614/759 objects] 80% Done / [615/759 objects] 81% Done / [616/759 objects] 81% Done / [617/759 objects] 81% Done / [618/759 objects] 81% Done / [619/759 objects] 81% Done / [620/759 objects] 81% Done / [621/759 objects] 81% Done / [622/759 objects] 81% Done / [623/759 objects] 82% Done / [624/759 objects] 82% Done / [625/759 objects] 82% Done / [626/759 objects] 82% Done / [627/759 objects] 82% Done / [628/759 objects] 82% Done / [629/759 objects] 82% Done / [630/759 objects] 83% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/scanner-c854f7f8c-jdw9n_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/sensor-6d955c5b7c-llmc9-init-tls-certs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/sensor-6d955c5b7c-llmc9-sensor.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/sensor-6d955c5b7c-llmc9_describe.log... / [631/759 objects] 83% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/scanner-db-dd9d94d69-tkm8n_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/sensor-6d955c5b7c-llmc9-crs.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/scanner-db-dd9d94d69-tkm8n-init-db.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/webhookserver-84f798856c-jjr55-webhookserver.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/admission-control-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-db-dockercfg-jcm57_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/pods/webhookserver-84f798856c-jjr55_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/admission-control-dockercfg-gr2x7_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-htpasswd_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/builder-dockercfg-4lnrx_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-dockercfg-9jb8p_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-admin-pass_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-db-password_describe.log... / [632/759 objects] 83% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-db-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-default-tls-secret_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/default-dockercfg-dn45g_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/collector-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-stackrox-central-services-proxy-env_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/collector-dockercfg-2wg5p_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-monitoring-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/config-controller-dockercfg-r5r79_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/central-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/helm-cluster-config_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/scanner-db-password_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/deployer-dockercfg-zvd75_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/scanner-db-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/scanner-dockercfg-66ldk_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/scanner-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/securedcluster-stackrox-secured-cluster-services-proxy-env_describe.log... / [633/759 objects] 83% Done / [634/759 objects] 83% Done / [635/759 objects] 83% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/sensor-dockercfg-qslph_describe.log... / [636/759 objects] 83% Done / [637/759 objects] 83% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/sensor-monitoring-tls_describe.log... / [638/759 objects] 84% Done / [639/759 objects] 84% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/service-ca_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/sensor-tls_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/sh.helm.release.v1.stackrox-central-services.v1_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/sh.helm.release.v1.stackrox-secured-cluster-services.v1_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/sh.helm.release.v1.webhookserver.v1_describe.log... / [640/759 objects] 84% Done / [641/759 objects] 84% Done / [642/759 objects] 84% Done / [643/759 objects] 84% Done / [644/759 objects] 84% Done / [645/759 objects] 84% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/stackrox_describe.log... / [646/759 objects] 85% Done / [647/759 objects] 85% Done / [648/759 objects] 85% Done / [649/759 objects] 85% Done / [650/759 objects] 85% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-scanner-v4-indexer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-scanner-db_describe.log... / [651/759 objects] 85% Done / [652/759 objects] 85% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-scanner-v4-db_describe.log... / [653/759 objects] 86% Done / [654/759 objects] 86% Done / [655/759 objects] 86% Done / [656/759 objects] 86% Done / [657/759 objects] 86% Done / [658/759 objects] 86% Done / [659/759 objects] 86% Done / [660/759 objects] 86% Done / [661/759 objects] 87% Done / [662/759 objects] 87% Done / [663/759 objects] 87% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-admission-control_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-collector_describe.log... / [664/759 objects] 87% Done / [665/759 objects] 87% Done / [666/759 objects] 87% Done / [667/759 objects] 87% Done / [668/759 objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/central-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/builder_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/config-controller_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/central_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/webhook-server-certs_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/deployer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/secrets/tls-cert-sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/default_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/securedclusters/stackrox-secured-cluster-services_describe.log... / [669/759 objects] 88% Done / [670/759 objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/collector_describe.log... / [671/759 objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/admission-control_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/services/central-loadbalancer_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/services/central-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/serviceaccounts/scanner_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/services/central_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/services/admission-control_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/services/scanner-db_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/services/scanner_describe.log... / [672/759 objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/services/sensor_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/services/sensor-webhook_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/services/webhookserver_describe.log... / [673/759 objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/autoscaling.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io_describe.log... / [674/759 objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/machine-api_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io_describe.log... / [675/759 objects] 88% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/multus.openshift.io_describe.log... / [676/759 objects] 89% Done / [677/759 objects] 89% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/network-node-identity.openshift.io_describe.log... / [678/759 objects] 89% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/performance-addon-operator_describe.log... / [679/759 objects] 89% Done Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/prometheusrules.openshift.io_describe.log... Setting metadata on gs://stackrox-ci-artifacts/stackrox/nightly-20251127/1993877827367211008-periodic-ci-stackrox-stackrox-master-ocp-4.21-lp-interop-cr-acs-latest-acs-tests-aws/part-1/k8s-logs/stackrox/validatingwebhookconfigurations/stackrox_describe.log... / [680/759 objects] 89% Done / [681/759 objects] 89% Done / [682/759 objects] 89% Done / [683/759 objects] 89% Done / [684/759 objects] 90% Done / [685/759 objects] 90% Done / [686/759 objects] 90% Done / [687/759 objects] 90% Done / [688/759 objects] 90% Done / [689/759 objects] 90% Done / [690/759 objects] 90% Done / [691/759 objects] 91% Done / [692/759 objects] 91% Done / [693/759 objects] 91% Done / [694/759 objects] 91% Done / [695/759 objects] 91% Done / [696/759 objects] 91% Done / [697/759 objects] 91% Done / [698/759 objects] 91% Done / [699/759 objects] 92% Done / [700/759 objects] 92% Done / [701/759 objects] 92% Done / [702/759 objects] 92% Done / [703/759 objects] 92% Done / [704/759 objects] 92% Done / [705/759 objects] 92% Done / [706/759 objects] 93% Done / [707/759 objects] 93% Done / [708/759 objects] 93% Done / [709/759 objects] 93% Done / [710/759 objects] 93% Done / [711/759 objects] 93% Done / [712/759 objects] 93% Done / [713/759 objects] 93% Done / [714/759 objects] 94% Done / [715/759 objects] 94% Done / [716/759 objects] 94% Done / [717/759 objects] 94% Done / [718/759 objects] 94% Done / [719/759 objects] 94% Done / [720/759 objects] 94% Done / [721/759 objects] 94% Done / [722/759 objects] 95% Done / [723/759 objects] 95% Done / [724/759 objects] 95% Done / [725/759 objects] 95% Done / [726/759 objects] 95% Done / [727/759 objects] 95% Done / [728/759 objects] 95% Done / [729/759 objects] 96% Done / [730/759 objects] 96% Done / [731/759 objects] 96% Done / [732/759 objects] 96% Done / [733/759 objects] 96% Done / [734/759 objects] 96% Done / [735/759 objects] 96% Done / [736/759 objects] 96% Done / [737/759 objects] 97% Done / [738/759 objects] 97% Done / [739/759 objects] 97% Done / [740/759 objects] 97% Done / [741/759 objects] 97% Done / [742/759 objects] 97% Done / [743/759 objects] 97% Done / [744/759 objects] 98% Done / [745/759 objects] 98% Done / [746/759 objects] 98% Done / [747/759 objects] 98% Done / [748/759 objects] 98% Done / [749/759 objects] 98% Done / [750/759 objects] 98% Done / [751/759 objects] 98% Done / [752/759 objects] 99% Done / [753/759 objects] 99% Done / [754/759 objects] 99% Done / [755/759 objects] 99% Done / [756/759 objects] 99% Done / [757/759 objects] 99% Done / [758/759 objects] 99% Done / [759/759 objects] 100% Done Operation completed over 759 objects. 06:14:13: Running post command: ['scripts/ci/store-artifacts.sh', 'make_artifacts_help'] INFO: Thu Nov 27 06:14:13 UTC 2025: Setting up GCP auth and config Current project is already set to acs-san-stackroxci. Assuming configuration already applied. GOOGLE_APPLICATION_CREDENTIALS: /tmp/gcp.json gsutil version: 5.34 checksum: e9e09c5d0bea2ff3b9f0f84007f7bbf8 (OK) boto version: 2.49.0 python version: 3.12.10 (main, Apr 25 2025, 21:39:22) [Clang 20.1.0 ] OS: Linux 5.14.0-570.64.1.el9_6.x86_64 multiprocessing available: True using cloud sdk: True pass cloud sdk credentials to gsutil: True config path(s): /alabama/.config/gcloud/legacy_credentials/stackrox-ci@acs-san-stackroxci.iam.gserviceaccount.com/.boto gsutil path: /usr/lib64/google-cloud-sdk/bin/gsutil compiled crcmod: True installed via package manager: False editable install: False shim enabled: False INFO: Thu Nov 27 06:14:15 UTC 2025: Artifacts are stored in a GCS bucket (gs://stackrox-ci-artifacts) 06:14:15: Running post command: ['qa-tests-backend/scripts/lib.sh', 'surface_spec_logs'] 06:14:16: Running post command: ['tests/e2e/lib.sh', 'handle_e2e_progress_failures'] INFO: Thu Nov 27 06:14:16 UTC 2025: Checking for progress events INFO: Thu Nov 27 06:14:16 UTC 2025: No job specific progress markers are saved for: ocp-qa-e2e-tests **** **** 06:14:16: final post completed **** Traceback (most recent call last): File "/go/src/github.com/stackrox/stackrox/scripts/ci/jobs/ocp_qa_e2e_tests.py", line 19, in make_qa_e2e_test_runner(cluster=AutomationFlavorsCluster()).run() File "/go/src/github.com/stackrox/stackrox/.openshift-ci/runners.py", line 122, in run raise exception File "/go/src/github.com/stackrox/stackrox/.openshift-ci/runners.py", line 96, in run test_set.run() File "/go/src/github.com/stackrox/stackrox/.openshift-ci/runners.py", line 64, in run raise exception File "/go/src/github.com/stackrox/stackrox/.openshift-ci/runners.py", line 52, in run self._post_test.run( File "/go/src/github.com/stackrox/stackrox/.openshift-ci/post_tests.py", line 198, in run self.handle_run_failure() File "/go/src/github.com/stackrox/stackrox/.openshift-ci/post_tests.py", line 68, in handle_run_failure raise RuntimeError(f"Post failed: exit {self.exitstatus}") RuntimeError: Post failed: exit 1 INFO: Thu Nov 27 06:14:16 UTC 2025: Executing a general purpose exit trap for CI Exit code is: 1 INFO: Thu Nov 27 06:14:16 UTC 2025: Post processing junit records to JIRA issues, BigQuery metrics and Slack attachments as appropriate INFO: Thu Nov 27 06:14:16 UTC 2025: Will use junit2jira to create CSV for BigQuery input time="Nov 27 06:14:17" level=info msg="Found 1 failed tests" time="Nov 27 06:14:18" level=info msg="Found issue. Creating a comment..." ID=ROX-32040 summary="Check unexpected pod restarts / pod config-controller - container manager FAILED" INFO: Thu Nov 27 06:14:18 UTC 2025: Saving Big Query test records from /tmp/tmp.LYUe7lgA6G.csv to gs://stackrox-ci-artifacts/test-metrics/upload Copying file:///tmp/tmp.LYUe7lgA6G.csv to gs://stackrox-ci-artifacts/test-metrics/upload/tmp.LYUe7lgA6G.csv .. INFO: Thu Nov 27 06:14:19 UTC 2025: Process state at exit: PID PPID S TTY TIME COMMAND 1 0 S ? 00:00:00 /tmp/entrypoint-wrapper/entrypoint-wrapper /tools/entrypoint 19 1 S ? 00:00:00 /tools/entrypoint 31 19 S ? 00:00:00 /bin/real-bash -c #!/bin/bash set -eu #!/bin/bash set -o errexit set -o nounset set -o pipefail function install_yq() { # Install yq manually if not found in image echo "Installing yq" mkdir -p /tmp/bin export PATH=$PATH:/tmp/bin/ curl -L "https://github.com/mikefarah/yq/releases/latest/download/yq_linux_$(uname -m | sed 's/aarch64/arm64/;s/x86_64/amd64/')" \ -o /tmp/bin/yq && chmod +x /tmp/bin/yq # Verify installation cmd_yq="$(/tmp/bin/yq --version 2>/dev/null || true)" if [ -n "$cmd_yq" ]; then echo "yq version: $cmd_yq" else # Skip test mapping since yq isn't available export MAP_TESTS="false" fi } function mapTestsForComponentReadiness() { if [[ $MAP_TESTS == "true" ]]; then results_file="${1}" echo "Patching Tests Result File: ${results_file}" if [ -f "${results_file}" ]; then echo "Mapping Test Suite Name To: ACSLatest-lp-interop" /tmp/bin/yq eval -ox -iI0 '.testsuite."+@name" = "ACSLatest-lp-interop"' "$results_file" || echo "Warning: yq failed for ${results_file}, debug manually" >&2 fi fi } # Archive results function function cleanup-collect() { if [[ $MAP_TESTS == "true" ]]; then install_yq original_results="${ARTIFACT_DIR}/original_results/" mkdir "${original_results}" || true echo "Collecting original results in ${original_results}" # Keep a copy of all the original Junit files before modifying them cp -r "${ARTIFACT_DIR}"/junit-* "${original_results}" || echo "Warning: couldn't copy original files" >&2 # Safely handle filenames with spaces find "${ARTIFACT_DIR}" -type f -iname "*.xml" -print0 | while IFS= read -r -d '' result_file; do # Map tests if needed for related use cases mapTestsForComponentReadiness "${result_file}" done # Send modified files to shared dir for Data Router Reporter step cp -r "${ARTIFACT_DIR}"/junit-* "${SHARED_DIR}" || echo "Warning: couldn't copy files to SHARED_DIR" >&2 fi } # Post test execution trap 'cleanup-collect' SIGINT SIGTERM ERR EXIT job="${TEST_SUITE:-${JOB_NAME_SAFE#merge-}}" job="${job#nightly-}" # this part is used for interop opp testing under stolostron/policy-collection if [ ! -f ".openshift-ci/dispatch.sh" ];then if [ ! -d "stackrox" ];then git clone https://github.com/stackrox/stackrox.git fi cd stackrox || exit fi .openshift-ci/dispatch.sh "${job}" 32 31 S ? 00:00:00 /bin/real-bash .openshift-ci/dispatch.sh ocp-qa-e2e-tests 6510 1 Z ? 00:00:00 [real-bash] 6514 1 Z ? 00:00:00 [real-bash] 15829 1 Z ? 00:00:00 [real-bash] 15833 1 Z ? 00:00:00 [real-bash] 15843 1 Z ? 00:00:00 [real-bash] 16741 1 Z ? 00:00:00 [real-bash] 16745 1 Z ? 00:00:00 [real-bash] 16798 1 S ? 00:00:00 /bin/real-bash /go/src/github.com/stackrox/stackrox/scripts/ci/create-webhookserver.sh restart_webhook_server_port_forward collector-vtrn9 16801 16798 S ? 00:00:00 kubectl -n stackrox port-forward svc/webhookserver 8080:8080 -v=6 17105 1 S ? 00:05:07 /usr/lib/jvm/java-17-openjdk-17.0.14.0.7-2.el9.x86_64/bin/java --add-opens=java.base/java.lang=ALL-UNNAMED --add-opens=java.base/java.lang.invoke=ALL-UNNAMED --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.prefs/java.util.prefs=ALL-UNNAMED --add-exports=jdk.compiler/com.sun.tools.javac.api=ALL-UNNAMED --add-exports=jdk.compiler/com.sun.tools.javac.util=ALL-UNNAMED --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.prefs/java.util.prefs=ALL-UNNAMED --add-opens=java.base/java.nio.charset=ALL-UNNAMED --add-opens=java.base/java.net=ALL-UNNAMED --add-opens=java.base/java.util.concurrent.atomic=ALL-UNNAMED --add-opens=java.xml/javax.xml.namespace=ALL-UNNAMED -Xmx4G -Dfile.encoding=UTF-8 -Duser.country=US -Duser.language=en -Duser.variant -cp /alabama/wrapper/dists/gradle-8.13-bin/5xuhj0ry160q40clulazy9h7d/gradle-8.13/lib/gradle-daemon-main-8.13.jar -javaagent:/alabama/wrapper/dists/gradle-8.13-bin/5xuhj0ry160q40clulazy9h7d/gradle-8.13/lib/agents/gradle-instrumentation-agent-8.13.jar org.gradle.launcher.daemon.bootstrap.GradleDaemon 8.13 20518 1 Z ? 00:00:00 [kubectl] 103976 32 R ? 00:00:00 ps -e -O ppid Ignoring ci-operator entrypoint or defunct process: 1 0 S ? 00:00:00 /tmp/entrypoint-wrapper/entrypoint-wrapper /tools/entrypoint Ignoring ci-operator entrypoint or defunct process: 19 1 S ? 00:00:00 /tools/entrypoint A candidate to kill: 31 19 S ? 00:00:00 /bin/real-bash -c #!/bin/bash set -eu #!/bin/bash set -o errexit set -o nounset set -o pipefail function install_yq() { # Install yq manually if not found in image echo "Installing yq" mkdir -p /tmp/bin export PATH=$PATH:/tmp/bin/ curl -L "https://github.com/mikefarah/yq/releases/latest/download/yq_linux_$(uname -m | sed 's/aarch64/arm64/;s/x86_64/amd64/')" \ -o /tmp/bin/yq && chmod +x /tmp/bin/yq # Verify installation cmd_yq="$(/tmp/bin/yq --version 2>/dev/null || true)" if [ -n "$cmd_yq" ]; then echo "yq version: $cmd_yq" else # Skip test mapping since yq isn't available export MAP_TESTS="false" fi } function mapTestsForComponentReadiness() { if [[ $MAP_TESTS == "true" ]]; then results_file="${1}" echo "Patching Tests Result File: ${results_file}" if [ -f "${results_file}" ]; then echo "Mapping Test Suite Name To: ACSLatest-lp-interop" /tmp/bin/yq eval -ox -iI0 '.testsuite."+@name" = "ACSLatest-lp-interop"' "$results_file" || echo "Warning: yq failed for ${results_file}, debug manually" >&2 fi fi } # Archive results function function cleanup-collect() { if [[ $MAP_TESTS == "true" ]]; then install_yq original_results="${ARTIFACT_DIR}/original_results/" mkdir "${original_results}" || true echo "Collecting original results in ${original_results}" # Keep a copy of all the original Junit files before modifying them cp -r "${ARTIFACT_DIR}"/junit-* "${original_results}" || echo "Warning: couldn't copy original files" >&2 # Safely handle filenames with spaces find "${ARTIFACT_DIR}" -type f -iname "*.xml" -print0 | while IFS= read -r -d '' result_file; do # Map tests if needed for related use cases mapTestsForComponentReadiness "${result_file}" done # Send modified files to shared dir for Data Router Reporter step cp -r "${ARTIFACT_DIR}"/junit-* "${SHARED_DIR}" || echo "Warning: couldn't copy files to SHARED_DIR" >&2 fi } # Post test execution trap 'cleanup-collect' SIGINT SIGTERM ERR EXIT job="${TEST_SUITE:-${JOB_NAME_SAFE#merge-}}" job="${job#nightly-}" # this part is used for interop opp testing under stolostron/policy-collection if [ ! -f ".openshift-ci/dispatch.sh" ];then if [ ! -d "stackrox" ];then git clone https://github.com/stackrox/stackrox.git fi cd stackrox || exit fi .openshift-ci/dispatch.sh "${job}" Will kill 31 Ignoring self: 32 31 S ? 00:00:00 /bin/real-bash .openshift-ci/dispatch.sh ocp-qa-e2e-tests Ignoring ci-operator entrypoint or defunct process: 6510 1 Z ? 00:00:00 [real-bash] Ignoring ci-operator entrypoint or defunct process: 6514 1 Z ? 00:00:00 [real-bash] Ignoring ci-operator entrypoint or defunct process: 15829 1 Z ? 00:00:00 [real-bash] Ignoring ci-operator entrypoint or defunct process: 15833 1 Z ? 00:00:00 [real-bash] Ignoring ci-operator entrypoint or defunct process: 15843 1 Z ? 00:00:00 [real-bash] Ignoring ci-operator entrypoint or defunct process: 16741 1 Z ? 00:00:00 [real-bash] Ignoring ci-operator entrypoint or defunct process: 16745 1 Z ? 00:00:00 [real-bash] A candidate to kill: 16798 1 S ? 00:00:00 /bin/real-bash /go/src/github.com/stackrox/stackrox/scripts/ci/create-webhookserver.sh restart_webhook_server_port_forward collector-vtrn9 Will kill 16798 A candidate to kill: 16801 16798 S ? 00:00:00 kubectl -n stackrox port-forward svc/webhookserver 8080:8080 -v=6 Will kill 16801 A candidate to kill: 17105 1 S ? 00:05:07 /usr/lib/jvm/java-17-openjdk-17.0.14.0.7-2.el9.x86_64/bin/java --add-opens=java.base/java.lang=ALL-UNNAMED --add-opens=java.base/java.lang.invoke=ALL-UNNAMED --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.prefs/java.util.prefs=ALL-UNNAMED --add-exports=jdk.compiler/com.sun.tools.javac.api=ALL-UNNAMED --add-exports=jdk.compiler/com.sun.tools.javac.util=ALL-UNNAMED --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.prefs/java.util.prefs=ALL-UNNAMED --add-opens=java.base/java.nio.charset=ALL-UNNAMED --add-opens=java.base/java.net=ALL-UNNAMED --add-opens=java.base/java.util.concurrent.atomic=ALL-UNNAMED --add-opens=java.xml/javax.xml.namespace=ALL-UNNAMED -Xmx4G -Dfile.encoding=UTF-8 -Duser.country=US -Duser.language=en -Duser.variant -cp /alabama/wrapper/dists/gradle-8.13-bin/5xuhj0ry160q40clulazy9h7d/gradle-8.13/lib/gradle-daemon-main-8.13.jar -javaagent:/alabama/wrapper/dists/gradle-8.13-bin/5xuhj0ry160q40clulazy9h7d/gradle-8.13/lib/agents/gradle-instrumentation-agent-8.13.jar org.gradle.launcher.daemon.bootstrap.GradleDaemon 8.13 Will kill 17105 Ignoring ci-operator entrypoint or defunct process: 20518 1 Z ? 00:00:00 [kubectl] Ignoring child: 103977 32 R ? 00:00:00 ps -e -O ppid Ignoring child: 103978 32 R ? 00:00:00 /bin/real-bash .openshift-ci/dispatch.sh ocp-qa-e2e-tests Installing yq % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 10.9M 100 10.9M 0 0 76.1M 0 --:--:-- --:--:-- --:--:-- 76.1M yq version: yq (https://github.com/mikefarah/yq/) version v4.49.2 Collecting original results in /logs/artifacts/original_results/ Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-prebuilt-start.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-system-start.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-system-await.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-prebuilt-await.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-OOM Check.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-Check unexpected pod restarts.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-Image_Availability.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-Stackrox_Deployment.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testBegin/TEST-VulnMgmtSACTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-DeclarativeConfigTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ProcessesListeningOnPortsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ProcessBaselinesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ImageManagementTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CloudSourcesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentCheck.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ProcessVisualizationReplicaTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AttemptedAlertsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AutocompleteTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkBaselineTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-SACTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ExternalNetworkSourcesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ImageSignatureVerificationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationsSplunkViolationsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkFlowTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GraphQLResourcePaginationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ProcessVisualizationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RbacAuthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-K8sEventDetectionTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NodeTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnScanWithGraphQLTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-HelpersTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClustersTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PaginationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ImageScanningTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CertRotationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RuntimeViolationLifecycleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationHealthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-LocalQaPropsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-BuiltinPoliciesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AdmissionControllerNoImageScanTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClientCertAuthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnReportingTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuditScrubbingTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClusterInitBundleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkSimulator.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnMgmtTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PolicyFieldsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DefaultPoliciesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuditLogAlertsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RetryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GlobalSearch.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NamespaceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-K8sRbacTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RoutesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DiagnosticBundleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CSVTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NodeInventoryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GroupsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuthServiceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CertExpiryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-Enforcement.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-SecretsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RiskTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentEventGraphQLTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PolicyConfigurationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RuntimePolicyTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-prebuilt-start.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-system-await.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-prebuilt-await.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-OOM Check.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Check unexpected pod restarts.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Image_Availability.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Stackrox_Deployment.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-system-start.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testBegin/TEST-VulnMgmtSACTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-Enforcement.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-SecretsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RiskTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentEventGraphQLTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PolicyConfigurationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RuntimePolicyTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NodeInventoryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GroupsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuthServiceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CertExpiryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NamespaceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-K8sRbacTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RoutesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DiagnosticBundleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CSVTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuditScrubbingTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClusterInitBundleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkSimulator.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnMgmtTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PolicyFieldsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DefaultPoliciesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuditLogAlertsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RetryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GlobalSearch.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnReportingTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClientCertAuthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AdmissionControllerNoImageScanTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-BuiltinPoliciesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-LocalQaPropsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ImageScanningTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CertRotationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RuntimeViolationLifecycleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationHealthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CloudSourcesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentCheck.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ProcessVisualizationReplicaTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AttemptedAlertsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AutocompleteTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkBaselineTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-SACTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ExternalNetworkSourcesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ImageSignatureVerificationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationsSplunkViolationsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkFlowTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GraphQLResourcePaginationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ProcessVisualizationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RbacAuthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-K8sEventDetectionTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NodeTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnScanWithGraphQLTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-HelpersTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClustersTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PaginationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-DeclarativeConfigTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ProcessesListeningOnPortsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ProcessBaselinesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ImageManagementTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Installing yq % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 10.9M 100 10.9M 0 0 94.5M 0 --:--:-- --:--:-- --:--:-- 94.5M yq version: yq (https://github.com/mikefarah/yq/) version v4.49.2 mkdir: cannot create directory '/logs/artifacts/original_results/': File exists Collecting original results in /logs/artifacts/original_results/ Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-prebuilt-start.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-system-start.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-system-await.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-prebuilt-await.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-OOM Check.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-Check unexpected pod restarts.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-Image_Availability.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-Stackrox_Deployment.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testBegin/TEST-VulnMgmtSACTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-DeclarativeConfigTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ProcessesListeningOnPortsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ProcessBaselinesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ImageManagementTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CloudSourcesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentCheck.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ProcessVisualizationReplicaTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AttemptedAlertsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AutocompleteTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkBaselineTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-SACTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ExternalNetworkSourcesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ImageSignatureVerificationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationsSplunkViolationsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkFlowTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GraphQLResourcePaginationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ProcessVisualizationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RbacAuthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-K8sEventDetectionTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NodeTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnScanWithGraphQLTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-HelpersTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClustersTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PaginationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ImageScanningTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CertRotationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RuntimeViolationLifecycleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationHealthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-LocalQaPropsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-BuiltinPoliciesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AdmissionControllerNoImageScanTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClientCertAuthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnReportingTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuditScrubbingTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClusterInitBundleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkSimulator.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnMgmtTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PolicyFieldsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DefaultPoliciesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuditLogAlertsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RetryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GlobalSearch.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NamespaceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-K8sRbacTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RoutesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DiagnosticBundleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CSVTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NodeInventoryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GroupsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuthServiceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CertExpiryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-Enforcement.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-SecretsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RiskTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentEventGraphQLTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PolicyConfigurationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RuntimePolicyTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-prebuilt-start.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-system-await.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-prebuilt-await.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-OOM Check.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Check unexpected pod restarts.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Image_Availability.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Stackrox_Deployment.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-system-start.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testBegin/TEST-VulnMgmtSACTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-Enforcement.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-SecretsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RiskTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentEventGraphQLTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PolicyConfigurationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RuntimePolicyTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NodeInventoryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GroupsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuthServiceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CertExpiryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NamespaceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-K8sRbacTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RoutesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DiagnosticBundleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CSVTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuditScrubbingTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClusterInitBundleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkSimulator.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnMgmtTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PolicyFieldsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DefaultPoliciesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuditLogAlertsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RetryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GlobalSearch.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnReportingTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClientCertAuthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AdmissionControllerNoImageScanTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-BuiltinPoliciesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-LocalQaPropsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ImageScanningTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CertRotationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RuntimeViolationLifecycleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationHealthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CloudSourcesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentCheck.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ProcessVisualizationReplicaTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AttemptedAlertsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AutocompleteTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkBaselineTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-SACTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ExternalNetworkSourcesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ImageSignatureVerificationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationsSplunkViolationsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkFlowTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GraphQLResourcePaginationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ProcessVisualizationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RbacAuthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-K8sEventDetectionTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NodeTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnScanWithGraphQLTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-HelpersTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClustersTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PaginationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-DeclarativeConfigTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ProcessesListeningOnPortsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ProcessBaselinesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ImageManagementTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Installing yq % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 10.9M 100 10.9M 0 0 87.7M 0 --:--:-- --:--:-- --:--:-- 87.7M yq version: yq (https://github.com/mikefarah/yq/) version v4.49.2 mkdir: cannot create directory '/logs/artifacts/original_results/': File exists Collecting original results in /logs/artifacts/original_results/ Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-prebuilt-start.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-system-start.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-system-await.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-image-prefetcher-prebuilt-await.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-OOM Check.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-Check unexpected pod restarts.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-Image_Availability.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-misc/junit-Stackrox_Deployment.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testBegin/TEST-VulnMgmtSACTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-DeclarativeConfigTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ProcessesListeningOnPortsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ProcessBaselinesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testParallel/TEST-ImageManagementTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CloudSourcesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentCheck.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ProcessVisualizationReplicaTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AttemptedAlertsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AutocompleteTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkBaselineTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-SACTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ExternalNetworkSourcesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ImageSignatureVerificationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationsSplunkViolationsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkFlowTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GraphQLResourcePaginationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ProcessVisualizationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RbacAuthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-K8sEventDetectionTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NodeTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnScanWithGraphQLTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-HelpersTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClustersTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PaginationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ImageScanningTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CertRotationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RuntimeViolationLifecycleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationHealthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-LocalQaPropsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-BuiltinPoliciesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AdmissionControllerNoImageScanTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClientCertAuthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnReportingTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuditScrubbingTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ClusterInitBundleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NetworkSimulator.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-VulnMgmtTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PolicyFieldsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DefaultPoliciesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuditLogAlertsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RetryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GlobalSearch.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NamespaceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-K8sRbacTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RoutesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DiagnosticBundleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CSVTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-NodeInventoryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-GroupsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-AuthServiceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-IntegrationsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-CertExpiryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-Enforcement.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-SecretsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RiskTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-DeploymentEventGraphQLTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-PolicyConfigurationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/junit-part-1-tests/testRest/TEST-RuntimePolicyTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-prebuilt-start.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-system-await.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-prebuilt-await.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-OOM Check.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Check unexpected pod restarts.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Image_Availability.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-Stackrox_Deployment.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-misc/junit-image-prefetcher-system-start.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testBegin/TEST-VulnMgmtSACTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ComplianceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-Enforcement.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-SecretsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RiskTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentEventGraphQLTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PolicyConfigurationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RuntimePolicyTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NodeInventoryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GroupsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuthServiceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CertExpiryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NamespaceTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-K8sRbacTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RoutesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DiagnosticBundleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CSVTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuditScrubbingTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClusterInitBundleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkSimulator.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnMgmtTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PolicyFieldsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DefaultPoliciesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AuditLogAlertsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RetryTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GlobalSearch.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnReportingTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClientCertAuthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AdmissionControllerNoImageScanTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-BuiltinPoliciesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-LocalQaPropsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ImageScanningTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CertRotationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RuntimeViolationLifecycleTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationHealthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-CloudSourcesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-DeploymentCheck.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ProcessVisualizationReplicaTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AttemptedAlertsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-AutocompleteTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkBaselineTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-SACTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ExternalNetworkSourcesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ImageSignatureVerificationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-IntegrationsSplunkViolationsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NetworkFlowTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-GraphQLResourcePaginationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ProcessVisualizationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-RbacAuthTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-K8sEventDetectionTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-NodeTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-VulnScanWithGraphQLTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-HelpersTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-ClustersTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testRest/TEST-PaginationTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-AdmissionControllerTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-DeclarativeConfigTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ProcessesListeningOnPortsTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ProcessBaselinesTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop Patching Tests Result File: /logs/artifacts/original_results/junit-part-1-tests/testParallel/TEST-ImageManagementTest.xml Mapping Test Suite Name To: ACSLatest-lp-interop