Now using project "default" on server "https://api.ci-op-4jsdcj4w-3c8f3.cspilp.interop.ccitredhat.com:6443". Fetching istioctl from https://github.com/istio/istio/releases/download/1.26.2/istioctl-1.26.2-linux-amd64.tar.gz istioctl extracted to /go/src/github.com/openshift-service-mesh/sail-operator/bin GINKGO_FLAGS="-v --keep-going --label-filter=smoke&&!cert-manager" /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/integ-suite-ocp.sh + echo 'Running integration tests' Running integration tests + '[' -z /tmp/secret/kubeconfig ']' + KUBECONFIG=/tmp/secret/kubeconfig + ./tests/e2e/common-operator-integ-suite.sh --ocp Running on OCP Skipping build Skipping deploy Setting Istio manifest file: chart/samples/istio-sample.yaml Validating OpenShift cluster operators are stable... All cluster operators are stable. go: downloading github.com/onsi/ginkgo/v2 v2.24.0 go: downloading golang.org/x/tools v0.36.0 go: downloading go.uber.org/automaxprocs v1.6.0 go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 go: downloading github.com/Masterminds/semver/v3 v3.4.0 go: downloading github.com/google/pprof v0.0.0-20250607225305-033d6d78b36a go: downloading github.com/Masterminds/semver v1.5.0 2026/02/26 04:19:17 maxprocs: Leaving GOMAXPROCS=16: CPU quota undefined go: downloading k8s.io/api v0.34.3 go: downloading sigs.k8s.io/controller-runtime v0.22.5 go: downloading k8s.io/apimachinery v0.34.3 go: downloading github.com/onsi/gomega v1.38.0 go: downloading gomodules.xyz/jsonpatch/v2 v2.5.0 go: downloading github.com/openshift-service-mesh/istio v0.0.0-20260120172234-6c2de1a903ef go: downloading k8s.io/apiextensions-apiserver v0.34.3 go: downloading github.com/go-logr/logr v1.4.3 go: downloading k8s.io/client-go v0.34.3 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading github.com/google/go-cmp v0.7.0 go: downloading github.com/evanphx/json-patch/v5 v5.9.11 go: downloading k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 go: downloading github.com/evanphx/json-patch v5.9.11+incompatible go: downloading golang.org/x/sys v0.35.0 go: downloading github.com/k8snetworkplumbingwg/network-attachment-definition-client v1.4.0 go: downloading istio.io/client-go v1.27.5 go: downloading github.com/gogo/protobuf v1.3.2 go: downloading sigs.k8s.io/randfill v1.0.0 go: downloading k8s.io/klog/v2 v2.130.1 go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.0 go: downloading golang.org/x/net v0.43.0 go: downloading sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 go: downloading k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading github.com/json-iterator/go v1.1.12 go: downloading go.yaml.in/yaml/v2 v2.4.2 go: downloading sigs.k8s.io/yaml v1.6.0 go: downloading istio.io/api v1.27.4-0.20251203120322-2b2a39461789 go: downloading go.yaml.in/yaml/v3 v3.0.4 go: downloading github.com/go-openapi/jsonreference v0.21.0 go: downloading github.com/go-openapi/swag v0.23.1 go: downloading github.com/google/gnostic-models v0.7.0 go: downloading golang.org/x/text v0.28.0 go: downloading github.com/prometheus/client_golang v1.23.0 go: downloading github.com/fxamacker/cbor/v2 v2.9.0 go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/spf13/pflag v1.0.7 go: downloading golang.org/x/term v0.34.0 go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc go: downloading google.golang.org/protobuf v1.36.7 go: downloading golang.org/x/time v0.12.0 go: downloading github.com/google/btree v1.1.3 go: downloading golang.org/x/sync v0.16.0 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee go: downloading github.com/google/uuid v1.6.0 go: downloading github.com/fsnotify/fsnotify v1.9.0 go: downloading github.com/go-openapi/jsonpointer v0.21.1 go: downloading golang.org/x/oauth2 v0.30.0 go: downloading github.com/mailru/easyjson v0.9.0 go: downloading github.com/x448/float16 v0.8.4 go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 go: downloading github.com/prometheus/client_model v0.6.2 go: downloading github.com/prometheus/common v0.65.0 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.3.0 go: downloading github.com/prometheus/procfs v0.17.0 go: downloading github.com/josharian/intern v1.0.0 go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 go: downloading github.com/golang/protobuf v1.5.4 go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250811230008-5f3141c8851a go: downloading github.com/emicklei/go-restful/v3 v3.12.2 go: downloading github.com/pkg/errors v0.9.1 go: downloading gopkg.in/natefinch/lumberjack.v2 v2.2.1 go: downloading github.com/spf13/cobra v1.9.1 go: downloading go.uber.org/zap v1.27.0 go: downloading google.golang.org/grpc v1.74.2 go: downloading go.uber.org/multierr v1.11.0 2026-02-26T04:19:44.570984Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Ambient Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient ============================================================================================================= Random Seed: 1772079557 Will run 45 of 45 specs ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when the IstioCNI CR is created with ambient profile deploys the CNI DaemonSet [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:86 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: values: cni: ambient: dnsCapture: true profile: ambient version: v1.27.5 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [25.306 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when the IstioCNI CR is created with ambient profile uses the configured values in the istio-cni-config config map [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:96 • [0.058 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when the Istio CR is created with ambient profile updates the Istio CR status to Reconciled [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:121 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.27.5 namespace: istio-system values: pilot: trustedZtunnelNamespace: ztunnel profile: ambient * Istio CR created * Istio CR is Reconciled • [1.375 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when the Istio CR is created with ambient profile updates the Istio CR status to Ready [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:127 * Istio CR is Ready • [22.305 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when the Istio CR is created with ambient profile deploys istiod [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:133 * Istiod is deployed in the namespace and Running • [1.042 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when the Istio CR is created with ambient profile uses the correct image [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:140 • [0.058 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when the Istio CR is created with ambient profile has istiod with appropriate env variables set [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:145 • [0.058 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when the ZTunnel CR is created deploys the ZTunnel DaemonSet [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:183 ZTunnel YAML: apiVersion: sailoperator.io/v1 kind: ZTunnel metadata: name: default spec: version: v1.27.5 namespace: ztunnel values: ztunnel: env: CUSTOM_ENV_VAR: "true" * ZTunnel created * ZTunnel DaemonSet is deployed and Running • [9.856 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when the ZTunnel CR is created has ztunnel running with appropriate env variables set [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:194 • [0.058 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when sample apps are deployed in the cluster updates the status of pods to Running [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:236 * Ambient validation pods deployed * Pods are ready • [8.201 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when sample apps are deployed in the cluster has the ztunnel proxy sockets configured in the pod network namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:244 • [0.838 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when sample apps are deployed in the cluster can access the httpbin service from the sleep pod [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:248 • [0.830 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when the Istio CR is deleted removes everything from the namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:259 * Istio CR deleted * Namespace is empty • [2.737 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:273 * IstioCNI deleted * CNI namespace is empty • [1.985 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.27.5 when the ZTunnel CR is deleted removes everything from the ztunnel namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:288 * ZTunnel deleted * ztunnel namespace is empty STEP: Cleaning up the httpbin Namespace @ 02/26/26 04:21:03.197 STEP: Cleaning up the istio-cni Namespace @ 02/26/26 04:21:03.258 STEP: Cleaning up the istio-system Namespace @ 02/26/26 04:21:03.319 STEP: Cleaning up the sleep Namespace @ 02/26/26 04:21:03.38 STEP: Cleaning up the ztunnel Namespace @ 02/26/26 04:21:03.444 STEP: Waiting for resources to be deleted @ 02/26/26 04:21:03.505 * Finished cleaning up resources • [19.524 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.26.8 when the IstioCNI CR is created with ambient profile deploys the CNI DaemonSet [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:86 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: values: cni: ambient: dnsCapture: true profile: ambient version: v1.26.8 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [19.799 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.26.8 when the IstioCNI CR is created with ambient profile uses the configured values in the istio-cni-config config map [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:96 • [0.058 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.26.8 when the Istio CR is created with ambient profile updates the Istio CR status to Reconciled [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:121 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.26.8 namespace: istio-system values: pilot: trustedZtunnelNamespace: ztunnel profile: ambient * Istio CR created * Istio CR is Reconciled • [1.382 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.26.8 when the Istio CR is created with ambient profile updates the Istio CR status to Ready [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:127 * Istio CR is Ready • [12.767 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.26.8 when the Istio CR is created with ambient profile deploys istiod [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:133 * Istiod is deployed in the namespace and Running • [1.038 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.26.8 when the Istio CR is created with ambient profile uses the correct image [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:140 • [0.059 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.26.8 when the Istio CR is created with ambient profile has istiod with appropriate env variables set [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:145 • [0.058 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.26.8 when the ZTunnel CR is created deploys the ZTunnel DaemonSet [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:183 ZTunnel YAML: apiVersion: sailoperator.io/v1 kind: ZTunnel metadata: name: default spec: version: v1.26.8 namespace: ztunnel values: ztunnel: env: CUSTOM_ENV_VAR: "true" * ZTunnel created * ZTunnel DaemonSet is deployed and Running • [0.341 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.26.8 when the ZTunnel CR is created has ztunnel running with appropriate env variables set [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:194 • [0.062 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.26.8 when sample apps are deployed in the cluster updates the status of pods to Running [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:236 * Ambient validation pods deployed * Pods are ready • [4.064 seconds] ------------------------------ Ambient configuration for supported versions Istio version 1.26.8 when sample apps are deployed in the cluster has the ztunnel proxy sockets configured in the pod network namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:244 [FAILED] in [It] - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:331 @ 02/26/26 04:21:59.315 STEP: Cleaning up the default IstioCNI @ 02/26/26 04:22:00.251 STEP: Cleaning up the default IstioRevision @ 02/26/26 04:22:00.383 STEP: Cleaning up the default Istio @ 02/26/26 04:22:00.584 STEP: Cleaning up the default ZTunnel @ 02/26/26 04:22:01.435 STEP: Waiting for resources to be deleted @ 02/26/26 04:22:01.498 * Finished cleaning up resources STEP: Cleaning up the httpbin Namespace @ 02/26/26 04:22:02.226 STEP: Cleaning up the istio-cni Namespace @ 02/26/26 04:22:02.288 STEP: Cleaning up the istio-system Namespace @ 02/26/26 04:22:02.349 STEP: Cleaning up the sleep Namespace @ 02/26/26 04:22:02.412 STEP: Cleaning up the ztunnel Namespace @ 02/26/26 04:22:02.473 STEP: Waiting for resources to be deleted @ 02/26/26 04:22:02.534 * Finished cleaning up resources The test run has failures and the debug information is as follows: =====Operator Deployment YAML=====: apiVersion: apps/v1 kind: Deployment metadata: annotations: deployment.kubernetes.io/revision: "1" creationTimestamp: "2026-02-26T04:13:13Z" generation: 1 labels: app.kubernetes.io/component: sail-operator app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/instance: servicemesh-operator3 app.kubernetes.io/managed-by: helm app.kubernetes.io/name: deployment app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 olm.deployment-spec-hash: buE8Ji5HzUIQCWGlISehVHZUQrs0h4LEEuvZb4 olm.managed: "true" olm.owner: servicemeshoperator3.v3.2.2 olm.owner.kind: ClusterServiceVersion olm.owner.namespace: openshift-operators operators.coreos.com/servicemeshoperator3.openshift-operators: "" name: servicemesh-operator3 namespace: openshift-operators ownerReferences: - apiVersion: operators.coreos.com/v1alpha1 blockOwnerDeletion: false controller: false kind: ClusterServiceVersion name: servicemeshoperator3.v3.2.2 uid: 5c4d665e-a1fe-42e1-bdec-bb63057509bd resourceVersion: "36458" uid: dca046d7-3494-4751-a448-6ec9d6ca919f spec: progressDeadlineSeconds: 600 replicas: 1 revisionHistoryLimit: 1 selector: matchLabels: app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 strategy: rollingUpdate: maxSurge: 25% maxUnavailable: 25% type: RollingUpdate template: metadata: annotations: alm-examples: |- [ { "apiVersion": "sailoperator.io/v1", "kind": "Istio", "metadata": { "name": "default" }, "spec": { "namespace": "istio-system", "updateStrategy": { "inactiveRevisionDeletionGracePeriodSeconds": 30, "type": "InPlace" }, "version": "v1.27.5" } }, { "apiVersion": "sailoperator.io/v1", "kind": "IstioCNI", "metadata": { "name": "default" }, "spec": { "namespace": "istio-cni", "version": "v1.27.5" } }, { "apiVersion": "sailoperator.io/v1", "kind": "ZTunnel", "metadata": { "name": "default" }, "spec": { "namespace": "ztunnel", "version": "v1.27.3" } } ] capabilities: Seamless Upgrades categories: OpenShift Optional, Integration & Delivery, Networking, Security containerImage: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:5d16c459a85c8f0580a8742911cd76b08f751f2600684cb0cad4acd13bc83743 createdAt: "2026-01-27T14:22:23Z" description: The OpenShift Service Mesh Operator enables you to install, configure, and manage an instance of Red Hat OpenShift Service Mesh. OpenShift Service Mesh is based on the open source Istio project. features.operators.openshift.io/cnf: "false" features.operators.openshift.io/cni: "true" features.operators.openshift.io/csi: "false" features.operators.openshift.io/disconnected: "true" features.operators.openshift.io/fips-compliant: "true" features.operators.openshift.io/proxy-aware: "false" features.operators.openshift.io/tls-profiles: "false" features.operators.openshift.io/token-auth-aws: "false" features.operators.openshift.io/token-auth-azure: "false" features.operators.openshift.io/token-auth-gcp: "false" images.v1_24_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2b60b0f33affda8b5b2cc30a4b09b2198b053fb1a914d386d35fcf03c09234e6 images.v1_24_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:a020acb4a74040df03077924e10465454092f6c34a902b391fba55563c08f826 images.v1_24_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:f592b91a6f28559abdf6546ff6c3ae70a44d8f811592746e9eb02cdb2e5dec9d images.v1_24_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:17db00a219de14e5901b5a5eca64d3c6684ca74c1dba3ae3b03787c655fe9c80 images.v1_24_4.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54cada48e5c9824f255f82daa2ef5bea236919e521d3ea49885f2883ced2b7bc images.v1_24_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:87b967785d7cc222f9df9cb49f0373a9819bf67910ce523dc3b8345849e881dd images.v1_24_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7fa655f5efb1175ff1e1c138371fc1233e5d4313c5feb07194428d0d1fdd33a3 images.v1_24_5.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:7ea9b82e192402566e69063a4787351be9f1ef50719bfd1a8f5d5940362b3f70 images.v1_24_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:0183bcce17e39308d1ceb8f4e7a88923f037f738b342e9673406cc2c44b525ac images.v1_24_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:0d8d08879a9af334b1ebb345c58bbd395cbfa77646552485329919e3bd075465 images.v1_24_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:5e1509e1746653b00125c540258d0eed2397ff74745f2d4854ca7e27f0e109ed images.v1_24_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:adcd26b9b64462153973ea1103f1c23c68012af315d804705be9ad927c89f7ff images.v1_24_6.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:2514a14cdec51d4570bed5678624d9406539842607bc52bbc98f3de40308f986 images.v1_26_2.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:14c5a52faf20267baa43d9a72ee6416f56fbc41dd640adc2aba3c4043802a0e9 images.v1_26_2.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:028e10651db0d1ddb769a27c9483c6d41be6ac597f253afd9d599f395d9c82d8 images.v1_26_2.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:366266f10e658c4cea86bddf6ee847e1908ea4dd780cb5f7fb0e466bac8995f1 images.v1_26_2.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:d518f3d1539f45e1253c5c9fa22062802804601d4998cd50344e476a3cc388fe images.v1_26_2.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:ecc6a22a471f4f4b836648f3a72ea7f57a4ea960ebcbc7dbe3fe729500902d0b images.v1_26_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2ea112ab90b8540f11e9949d77c3e7e3b3ef57ac3bf23f6cf1e883a88430e1f9 images.v1_26_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:33feac0c9c888b375e207e86b3f9a1a289126ca46b64632a7f693e2191cfbbfd images.v1_26_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:2ca96716812d339775d3dfd396c863834dd3810720e98bfcf87bc67c5fbd29b5 images.v1_26_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:26747627ae22bbdffcf9de58077454fc0c890cda83659d7834b15dea2b5aaaf2 images.v1_26_3.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f7ab868455b5e887e2d89b7078678531290365f9166cae99ce56119f31fa2ba4 images.v1_26_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:9536c5850961488b3e01e29140d9ace0cbaa1f4bd1c1860cb49d10bf0514a5bf images.v1_26_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:02b82941a92c537233c4f60d9223da2e637b045189b8700dd7030bd9c1c352d5 images.v1_26_4.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:cadc30c15a54d89de1992624a3641c7d5951dd292b668d026ab9d5e2f3878a77 images.v1_26_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b45ecae5a9240b40403c4e39c6a81ab66c8c7e8de194dc3e21b1336ff3a0fa38 images.v1_26_4.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:950e9a2e8fef8740b4909957c2cced52d45abd66324fb056097f2d0782970573 images.v1_26_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:be16b9a7e2693bf294c99d96ba4cf36e98629ebff2ce6f2ce946fd9ae1e9f2dc images.v1_26_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:91229b8d6e932178ddddf0b4878114b65c0451755919996239d1fe6285b644e8 images.v1_26_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:8a21e30593e51f2fd2e51d9ab1d0ed2fc43eaa9b98173d7fb74f799d6b2f163d images.v1_26_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:47100186c27934adeda3002bb04cac28980ca8854eee7d6e4f4b3f85562e9a8e images.v1_26_6.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f39e2c28ef36fce9f808f3946cc4e4126047e142ad84cb18c222cecceae29730 images.v1_26_8.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:dd02b94ca8e81ad0d0177f187cc7e67a52d58856f92e92bc4a71ab3f3723fd1f images.v1_26_8.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:e59864113e84cdf5f14d93229af720a1a3ab85b6e2ece8e0477079ab62a14068 images.v1_26_8.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:d607fea2f3f03ba269b90fcaa53f1a0e696113236e125da5be142cbcf89ae4cf images.v1_26_8.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b17a2794ec7b94f5c67ac7b6b230b9a699d0eadef0bc35ede58b17df64aa26fc images.v1_26_8.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:9f7b28f8c92b59715f9e1d0b7b463ae870fab5899c2332c53542ec5021541a78 images.v1_27_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:ddadd677161ad8c1077dd156821d6b4e32742ccbb210e9c14696fa66a58c0867 images.v1_27_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:0850242436e88f7d82f0f2126de064c7e0f09844f31d8ff0f53dc8d3908075d9 images.v1_27_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:742bc084c26769ff57cb3aa47b7a35c2b94684c3f67a9388da07a0490a942e5c images.v1_27_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7d15cebf9b62f3f235c0eab5158ac8ff2fda86a1d193490dc94c301402c99da8 images.v1_27_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:b2b3216a05f6136ed9ddb71d72d493030c6d6b431682dddffa692c760b6c9ba1 images.v1_27_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2929b7df3da8228a728945542647ec5450c0585a2ed5cbdb84f8e3d81ab41806 images.v1_27_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:2e515a40de141bd4e516bfcf4fd0cbb8d236ac02799a7a35d77ae44f53916bc9 images.v1_27_5.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:d1baba8cb454b62d804dc427d4ccfea928348631c384d1ab3d170e1e2a9d1178 images.v1_27_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:650da1e2ad1cb93e6a0231dba7ca1f27f4cccac84e5925135281adc629a0caea images.v1_27_5.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:0ae2919cd446e0e1f0a21d0850e7809ba8f44c06d484c023b3bee2787ca4bdd0 kubectl.kubernetes.io/default-container: sail-operator olm.operatorGroup: global-operators olm.operatorNamespace: openshift-operators olm.targetNamespaces: "" operatorframework.io/properties: '{"properties":[{"type":"olm.gvk","value":{"group":"extensions.istio.io","kind":"WasmPlugin","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"EnvoyFilter","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ProxyConfig","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"Istio","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioCNI","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioRevision","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioRevisionTag","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"ZTunnel","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"ZTunnel","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"AuthorizationPolicy","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"AuthorizationPolicy","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"PeerAuthentication","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"PeerAuthentication","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"RequestAuthentication","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"RequestAuthentication","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"telemetry.istio.io","kind":"Telemetry","version":"v1"}},{"type":"olm.gvk","value":{"group":"telemetry.istio.io","kind":"Telemetry","version":"v1alpha1"}},{"type":"olm.package","value":{"packageName":"servicemeshoperator3","version":"3.2.2"}}]}' operators.openshift.io/valid-subscription: '["OpenShift Container Platform", "OpenShift Platform Plus"]' operators.operatorframework.io/builder: operator-sdk-v1.41.1 operators.operatorframework.io/internal-objects: '["wasmplugins.extensions.istio.io","destinationrules.networking.istio.io","envoyfilters.networking.istio.io","gateways.networking.istio.io","proxyconfigs.networking.istio.io","serviceentries.networking.istio.io","sidecars.networking.istio.io","virtualservices.networking.istio.io","workloadentries.networking.istio.io","workloadgroups.networking.istio.io","authorizationpolicies.security.istio.io","peerauthentications.security.istio.io","requestauthentications.security.istio.io","telemetries.telemetry.istio.io"]' operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/istio-ecosystem/sail-operator support: Red Hat, Inc. labels: app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/arch operator: In values: - amd64 - arm64 - ppc64le - s390x - key: kubernetes.io/os operator: In values: - linux containers: - args: - --health-probe-bind-address=:8081 - --metrics-bind-address=:8443 - --zap-log-level=info command: - /usr/local/bin/sail-operator env: - name: OPERATOR_CONDITION_NAME value: servicemeshoperator3.v3.2.2 image: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:5d16c459a85c8f0580a8742911cd76b08f751f2600684cb0cad4acd13bc83743 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: sail-operator readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 1Gi requests: cpu: 10m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/sail-operator name: operator-config readOnly: true dnsPolicy: ClusterFirst restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true serviceAccount: servicemesh-operator3 serviceAccountName: servicemesh-operator3 terminationGracePeriodSeconds: 10 volumes: - downwardAPI: defaultMode: 420 items: - fieldRef: apiVersion: v1 fieldPath: metadata.annotations path: config.properties name: operator-config status: availableReplicas: 1 conditions: - lastTransitionTime: "2026-02-26T04:13:37Z" lastUpdateTime: "2026-02-26T04:13:37Z" message: Deployment has minimum availability. reason: MinimumReplicasAvailable status: "True" type: Available - lastTransitionTime: "2026-02-26T04:13:13Z" lastUpdateTime: "2026-02-26T04:13:37Z" message: ReplicaSet "servicemesh-operator3-5968d78df4" has successfully progressed. reason: NewReplicaSetAvailable status: "True" type: Progressing observedGeneration: 1 readyReplicas: 1 replicas: 1 updatedReplicas: 1 =====Operator logs=====: 2026-02-26T04:20:55Z INFO ctrlr.istiorev Removed finalizer {"IstioRevision": "default", "reconcileID": "46014894-81c3-4198-a1e3-47ec3791c5a1", "finalizer": "sailoperator.io/sail-operator"} 2026-02-26T04:20:57Z INFO ctrlr.istiocni Removed finalizer {"IstioCNI": "default", "reconcileID": "24ddf5fe-be66-43e5-bea4-e3b3301ffd97", "finalizer": "sailoperator.io/sail-operator"} 2026-02-26T04:20:59Z INFO ctrlr.ztunnel Removed finalizer {"ztunnel": "default", "reconcileID": "09de70ca-7943-41dc-8ff4-f64df28ebc81", "finalizer": "sailoperator.io/sail-operator"} 2026-02-26T04:20:59Z INFO ctrlr.ztunnel Resource no longer exists; no need to remove finalizer {"ztunnel": "default", "reconcileID": "c4f95b1d-d7ac-4219-b52d-d226fdfd7972", "finalizer": "sailoperator.io/sail-operator"} 2026-02-26T04:21:21Z INFO ctrlr.istiocni Added finalizer {"IstioCNI": "default", "reconcileID": "5b9e2b8a-c2a9-48df-a2d2-b635ab256c9d", "finalizer": "sailoperator.io/sail-operator"} 2026-02-26T04:21:21Z INFO ctrlr.istiocni Installing Helm chart {"IstioCNI": "default", "reconcileID": "54dc8af4-f871-43a4-80ee-cc00fd8ed1f6"} 2026-02-26T04:21:21.793572Z info klog Warning: spec.template.metadata.annotations[container.apparmor.security.beta.kubernetes.io/install-cni]: deprecated since v1.30; use the "appArmorProfile" field instead 2026-02-26T04:21:21.793609Z info klog Warning: would violate PodSecurity "restricted:latest": forbidden AppArmor profile (annotation must not set AppArmor profile type to "container.apparmor.security.beta.kubernetes.io/install-cni="unconfined""), seLinuxOptions (container "install-cni" set forbidden securityContext.seLinuxOptions: type "spc_t"), allowPrivilegeEscalation != false (container "install-cni" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "install-cni" must not include "DAC_OVERRIDE", "NET_ADMIN", "NET_RAW", "SYS_ADMIN", "SYS_PTRACE" in securityContext.capabilities.add), restricted volume types (volumes "cni-bin-dir", "cni-host-procfs", "cni-ztunnel-sock-dir", "cni-net-dir", "cni-socket-dir", "cni-netns-dir" use restricted volume type "hostPath"), runAsNonRoot != true (container "install-cni" must not set securityContext.runAsNonRoot=false), runAsUser=0 (container "install-cni" must not set runAsUser=0), seccompProfile (pod or container "install-cni" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") 2026-02-26T04:21:21Z INFO ctrlr.istiocni Reconciliation done. Updating status. {"IstioCNI": "default", "reconcileID": "54dc8af4-f871-43a4-80ee-cc00fd8ed1f6"} 2026-02-26T04:21:21Z INFO ctrlr.istiocni Installing Helm chart {"IstioCNI": "default", "reconcileID": "9865d358-e708-4abd-a59d-59a677f3339f"} 2026-02-26T04:21:22Z INFO ctrlr.istiocni Reconciliation done. Updating status. {"IstioCNI": "default", "reconcileID": "9865d358-e708-4abd-a59d-59a677f3339f"} 2026-02-26T04:21:22Z INFO ctrlr.istiocni Installing Helm chart {"IstioCNI": "default", "reconcileID": "2221d18e-ad22-45f4-a7cd-4ada899ac52a"} 2026-02-26T04:21:22Z INFO ctrlr.istiocni Reconciliation done. Updating status. {"IstioCNI": "default", "reconcileID": "2221d18e-ad22-45f4-a7cd-4ada899ac52a"} 2026-02-26T04:21:35Z INFO ctrlr.istiocni Installing Helm chart {"IstioCNI": "default", "reconcileID": "237897a3-522c-4ee3-ae8c-72de11ccf508"} 2026-02-26T04:21:36Z INFO ctrlr.istiocni Reconciliation done. Updating status. {"IstioCNI": "default", "reconcileID": "237897a3-522c-4ee3-ae8c-72de11ccf508"} 2026-02-26T04:21:36Z INFO ctrlr.istiocni Installing Helm chart {"IstioCNI": "default", "reconcileID": "a97f11f0-596b-4793-aa25-96e4843aab94"} 2026-02-26T04:21:36Z INFO ctrlr.istiocni Reconciliation done. Updating status. {"IstioCNI": "default", "reconcileID": "a97f11f0-596b-4793-aa25-96e4843aab94"} 2026-02-26T04:21:36Z INFO ctrlr.istiocni Installing Helm chart {"IstioCNI": "default", "reconcileID": "8791a92f-a261-4c71-9dd4-c720d1a0bf71"} 2026-02-26T04:21:36Z INFO ctrlr.istiocni Reconciliation done. Updating status. {"IstioCNI": "default", "reconcileID": "8791a92f-a261-4c71-9dd4-c720d1a0bf71"} 2026-02-26T04:21:36Z INFO ctrlr.istiocni Installing Helm chart {"IstioCNI": "default", "reconcileID": "be315f51-ef98-4ffd-9781-622f435ce5bf"} 2026-02-26T04:21:37Z INFO ctrlr.istiocni Reconciliation done. Updating status. {"IstioCNI": "default", "reconcileID": "be315f51-ef98-4ffd-9781-622f435ce5bf"} 2026-02-26T04:21:37Z INFO ctrlr.istiocni Installing Helm chart {"IstioCNI": "default", "reconcileID": "74537d67-2a7f-4110-a36a-9da2882af98f"} 2026-02-26T04:21:37Z INFO ctrlr.istiocni Reconciliation done. Updating status. {"IstioCNI": "default", "reconcileID": "74537d67-2a7f-4110-a36a-9da2882af98f"} 2026-02-26T04:21:37Z INFO ctrlr.istiocni Installing Helm chart {"IstioCNI": "default", "reconcileID": "cb3cf72f-077d-4d1d-80fb-98bf3451244f"} 2026-02-26T04:21:37Z INFO ctrlr.istiocni Reconciliation done. Updating status. {"IstioCNI": "default", "reconcileID": "cb3cf72f-077d-4d1d-80fb-98bf3451244f"} 2026-02-26T04:21:37Z INFO ctrlr.istiocni Installing Helm chart {"IstioCNI": "default", "reconcileID": "e63a3a40-85d2-4976-ba20-7a0f963f9307"} 2026-02-26T04:21:38Z INFO ctrlr.istiocni Reconciliation done. Updating status. {"IstioCNI": "default", "reconcileID": "e63a3a40-85d2-4976-ba20-7a0f963f9307"} 2026-02-26T04:21:38Z INFO ctrlr.istio Reconciling {"Istio": "default", "reconcileID": "1590b0a5-5017-4b81-b724-af908a934135"} 2026-02-26T04:21:38Z INFO ctrlr.istio Creating IstioRevision {"Istio": "default", "reconcileID": "1590b0a5-5017-4b81-b724-af908a934135", "IstioRevision": "default"} 2026-02-26T04:21:38Z INFO ctrlr.istio Reconciliation done. Updating status. {"Istio": "default", "reconcileID": "1590b0a5-5017-4b81-b724-af908a934135"} 2026-02-26T04:21:38Z INFO ctrlr.istiorev Added finalizer {"IstioRevision": "default", "reconcileID": "15a18f68-7153-40a1-bc26-cf4e79193d50", "finalizer": "sailoperator.io/sail-operator"} 2026-02-26T04:21:38Z INFO ctrlr.istiorev Installing Helm chart {"IstioRevision": "default", "reconcileID": "a19aa091-5daf-4b96-9f77-65fa105db6a8"} 2026-02-26T04:21:38Z INFO ctrlr.istio Reconciling {"Istio": "default", "reconcileID": "997a6f32-17bf-40d6-9591-3da9f88e82e8"} 2026-02-26T04:21:38Z INFO ctrlr.istio Updating IstioRevision {"Istio": "default", "reconcileID": "997a6f32-17bf-40d6-9591-3da9f88e82e8", "IstioRevision": "default"} 2026-02-26T04:21:38Z INFO ctrlr.istio Reconciliation done. Updating status. {"Istio": "default", "reconcileID": "997a6f32-17bf-40d6-9591-3da9f88e82e8"} 2026-02-26T04:21:39Z INFO ctrlr.istiorev Reconciliation done. Updating status. {"IstioRevision": "default", "reconcileID": "a19aa091-5daf-4b96-9f77-65fa105db6a8"} 2026-02-26T04:21:39Z INFO ctrlr.istiorev Installing Helm chart {"IstioRevision": "default", "reconcileID": "e42c3959-a854-40bf-bde0-8740662f57fb"} 2026-02-26T04:21:39Z INFO ctrlr.istio Reconciling {"Istio": "default", "reconcileID": "3b9c59eb-b884-4108-9c34-5df688f8eefb"} 2026-02-26T04:21:39Z INFO ctrlr.istio Updating IstioRevision {"Istio": "default", "reconcileID": "3b9c59eb-b884-4108-9c34-5df688f8eefb", "IstioRevision": "default"} 2026-02-26T04:21:39Z INFO ctrlr.istio Reconciliation done. Updating status. {"Istio": "default", "reconcileID": "3b9c59eb-b884-4108-9c34-5df688f8eefb"} 2026-02-26T04:21:39Z INFO ctrlr.istio Reconciling {"Istio": "default", "reconcileID": "54b74315-c9ac-4f7b-947e-44f4c351cc23"} 2026-02-26T04:21:39Z INFO ctrlr.istio Updating IstioRevision {"Istio": "default", "reconcileID": "54b74315-c9ac-4f7b-947e-44f4c351cc23", "IstioRevision": "default"} 2026-02-26T04:21:39Z INFO ctrlr.istio Reconciliation done. Updating status. {"Istio": "default", "reconcileID": "54b74315-c9ac-4f7b-947e-44f4c351cc23"} 2026-02-26T04:21:40Z INFO ctrlr.istiorev Reconciliation done. Updating status. {"IstioRevision": "default", "reconcileID": "e42c3959-a854-40bf-bde0-8740662f57fb"} 2026-02-26T04:21:40Z INFO ctrlr.istiorev Installing Helm chart {"IstioRevision": "default", "reconcileID": "20351794-d34f-441b-819e-2c086f5f5c8a"} 2026-02-26T04:21:40Z INFO ctrlr.istiorev Reconciliation done. Updating status. {"IstioRevision": "default", "reconcileID": "20351794-d34f-441b-819e-2c086f5f5c8a"} 2026-02-26T04:21:50Z INFO ctrlr.istiorev Installing Helm chart {"IstioRevision": "default", "reconcileID": "74a43fcf-58f0-49fd-98f5-bd54cb14813e"} 2026-02-26T04:21:51Z INFO ctrlr.istiorev Reconciliation done. Updating status. {"IstioRevision": "default", "reconcileID": "74a43fcf-58f0-49fd-98f5-bd54cb14813e"} 2026-02-26T04:21:51Z INFO ctrlr.istiorev Installing Helm chart {"IstioRevision": "default", "reconcileID": "ad3ceddd-01c4-4847-8a2e-50b85b7a6430"} 2026-02-26T04:21:51Z INFO ctrlr.istiorev Reconciliation done. Updating status. {"IstioRevision": "default", "reconcileID": "ad3ceddd-01c4-4847-8a2e-50b85b7a6430"} 2026-02-26T04:21:51Z INFO ctrlr.istiorev Installing Helm chart {"IstioRevision": "default", "reconcileID": "81c9aeb0-c48f-41c9-8fb1-3349158807b9"} 2026-02-26T04:21:51Z INFO ctrlr.istio Reconciling {"Istio": "default", "reconcileID": "b8171bc5-ff6c-4052-96fa-3037dbe259d2"} 2026-02-26T04:21:51Z INFO ctrlr.istio Updating IstioRevision {"Istio": "default", "reconcileID": "b8171bc5-ff6c-4052-96fa-3037dbe259d2", "IstioRevision": "default"} 2026-02-26T04:21:51Z INFO ctrlr.istio Reconciliation done. Updating status. {"Istio": "default", "reconcileID": "b8171bc5-ff6c-4052-96fa-3037dbe259d2"} 2026-02-26T04:21:52Z INFO ctrlr.istio Reconciling {"Istio": "default", "reconcileID": "4961174c-d7a2-415f-a59a-9fd30fa4999b"} 2026-02-26T04:21:52Z INFO ctrlr.istio Updating IstioRevision {"Istio": "default", "reconcileID": "4961174c-d7a2-415f-a59a-9fd30fa4999b", "IstioRevision": "default"} 2026-02-26T04:21:52Z INFO ctrlr.istio Reconciliation done. Updating status. {"Istio": "default", "reconcileID": "4961174c-d7a2-415f-a59a-9fd30fa4999b"} 2026-02-26T04:21:52Z INFO ctrlr.istiorev Reconciliation done. Updating status. {"IstioRevision": "default", "reconcileID": "81c9aeb0-c48f-41c9-8fb1-3349158807b9"} 2026-02-26T04:21:54Z INFO ctrlr.istiorev Installing Helm chart {"IstioRevision": "default", "reconcileID": "341b6d9c-481a-41a4-a4b6-b38b6431c61e"} 2026-02-26T04:21:54Z INFO ctrlr.ztunnel Added finalizer {"ztunnel": "default", "reconcileID": "5794ce7f-9aaa-4061-8862-ad3bf2149de7", "finalizer": "sailoperator.io/sail-operator"} 2026-02-26T04:21:54Z INFO ctrlr.ztunnel Installing ztunnel Helm chart {"ztunnel": "default", "reconcileID": "f832d8c7-f354-4fe8-b2ea-a8944b2b6b81"} 2026-02-26T04:21:54.376089Z info klog Warning: would violate PodSecurity "restricted:latest": seLinuxOptions (container "istio-proxy" set forbidden securityContext.seLinuxOptions: type "spc_t"), allowPrivilegeEscalation != false (container "istio-proxy" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "istio-proxy" must not include "NET_ADMIN", "NET_RAW", "SYS_ADMIN" in securityContext.capabilities.add), restricted volume types (volume "cni-ztunnel-sock-dir" uses restricted volume type "hostPath"), runAsNonRoot != true (container "istio-proxy" must not set securityContext.runAsNonRoot=false), runAsUser=0 (container "istio-proxy" must not set runAsUser=0), seccompProfile (pod or container "istio-proxy" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") 2026-02-26T04:21:54Z INFO ctrlr.ztunnel Reconciliation done. Updating status. {"ztunnel": "default", "reconcileID": "f832d8c7-f354-4fe8-b2ea-a8944b2b6b81"} 2026-02-26T04:21:54Z INFO ctrlr.ztunnel Installing ztunnel Helm chart {"ztunnel": "default", "reconcileID": "ccd59041-005e-4304-b29b-cf137c19f135"} 2026-02-26T04:21:54Z INFO ctrlr.ztunnel Reconciliation done. Updating status. {"ztunnel": "default", "reconcileID": "ccd59041-005e-4304-b29b-cf137c19f135"} 2026-02-26T04:21:54Z INFO ctrlr.ztunnel Installing ztunnel Helm chart {"ztunnel": "default", "reconcileID": "5e252070-d4be-44ed-b4e3-0476e435d8bb"} 2026-02-26T04:21:55Z INFO ctrlr.ztunnel Reconciliation done. Updating status. {"ztunnel": "default", "reconcileID": "5e252070-d4be-44ed-b4e3-0476e435d8bb"} 2026-02-26T04:21:55Z INFO ctrlr.ztunnel Installing ztunnel Helm chart {"ztunnel": "default", "reconcileID": "549c2be1-0181-4ce7-9f90-1a1d72ce9df8"} 2026-02-26T04:21:55Z INFO ctrlr.ztunnel Reconciliation done. Updating status. {"ztunnel": "default", "reconcileID": "549c2be1-0181-4ce7-9f90-1a1d72ce9df8"} 2026-02-26T04:21:55Z INFO ctrlr.istiorev Reconciliation done. Updating status. {"IstioRevision": "default", "reconcileID": "341b6d9c-481a-41a4-a4b6-b38b6431c61e"} 2026-02-26T04:21:55Z INFO ctrlr.istiorev Installing Helm chart {"IstioRevision": "default", "reconcileID": "8766ad95-1bc6-4051-825a-0c417b3d5432"} 2026-02-26T04:21:55Z INFO ctrlr.istio Reconciling {"Istio": "default", "reconcileID": "46a5bee0-b1e0-4a5f-8028-4f8193d6c41f"} 2026-02-26T04:21:55Z INFO ctrlr.istio Updating IstioRevision {"Istio": "default", "reconcileID": "46a5bee0-b1e0-4a5f-8028-4f8193d6c41f", "IstioRevision": "default"} 2026-02-26T04:21:55Z INFO ctrlr.istio Reconciliation done. Updating status. {"Istio": "default", "reconcileID": "46a5bee0-b1e0-4a5f-8028-4f8193d6c41f"} 2026-02-26T04:21:55Z INFO ctrlr.istio Reconciling {"Istio": "default", "reconcileID": "3a03f4ab-fa89-4422-ab59-fb329e41c6a4"} 2026-02-26T04:21:55Z INFO ctrlr.istio Updating IstioRevision {"Istio": "default", "reconcileID": "3a03f4ab-fa89-4422-ab59-fb329e41c6a4", "IstioRevision": "default"} 2026-02-26T04:21:55Z INFO ctrlr.istio Reconciliation done. Updating status. {"Istio": "default", "reconcileID": "3a03f4ab-fa89-4422-ab59-fb329e41c6a4"} 2026-02-26T04:21:56Z INFO ctrlr.istiorev Reconciliation done. Updating status. {"IstioRevision": "default", "reconcileID": "8766ad95-1bc6-4051-825a-0c417b3d5432"} 2026-02-26T04:21:56Z INFO ctrlr.istiorev Installing Helm chart {"IstioRevision": "default", "reconcileID": "74947910-40fc-492f-b764-163b1b538773"} 2026-02-26T04:21:57Z INFO ctrlr.istiorev Reconciliation done. Updating status. {"IstioRevision": "default", "reconcileID": "74947910-40fc-492f-b764-163b1b538773"} 2026-02-26T04:22:00Z INFO ctrlr.istiorev Installing Helm chart {"IstioRevision": "default", "reconcileID": "9f2007d6-6046-48a9-91b5-2549ac218bb7"} 2026-02-26T04:22:00Z INFO ctrlr.istio Reconciling {"Istio": "default", "reconcileID": "e878a8cf-d3c9-461a-b6d7-94fb083f535a"} 2026-02-26T04:22:00Z INFO ctrlr.istio Updating IstioRevision {"Istio": "default", "reconcileID": "e878a8cf-d3c9-461a-b6d7-94fb083f535a", "IstioRevision": "default"} 2026-02-26T04:22:00Z INFO ctrlr.istio Reconciliation done. Updating status. {"Istio": "default", "reconcileID": "e878a8cf-d3c9-461a-b6d7-94fb083f535a"} 2026-02-26T04:22:00Z INFO ctrlr.istiocni Removed finalizer {"IstioCNI": "default", "reconcileID": "09afbce1-6847-44d5-8389-70eaac8d43e7", "finalizer": "sailoperator.io/sail-operator"} 2026-02-26T04:22:01Z INFO ctrlr.istiorev Reconciliation done. Updating status. {"IstioRevision": "default", "reconcileID": "9f2007d6-6046-48a9-91b5-2549ac218bb7"} 2026-02-26T04:22:01Z INFO ctrlr.ztunnel Removed finalizer {"ztunnel": "default", "reconcileID": "20d18a1e-62e4-48a1-9009-07a701d2f1a9", "finalizer": "sailoperator.io/sail-operator"} 2026-02-26T04:22:01Z INFO ctrlr.ztunnel Resource no longer exists; no need to remove finalizer {"ztunnel": "default", "reconcileID": "1cd8b85a-cbcb-4627-9b0b-bdc01be95586", "finalizer": "sailoperator.io/sail-operator"} 2026-02-26T04:22:01Z INFO ctrlr.istiorev Removed finalizer {"IstioRevision": "default", "reconcileID": "d56f85f7-6445-498a-a1b9-78d548dfa41b", "finalizer": "sailoperator.io/sail-operator"} =====Events in openshift-operators=====: LAST SEEN TYPE REASON OBJECT MESSAGE 9m19s Warning AppliedWithWarnings installplan/install-gkvkm 1 warning(s) generated during installation of operator "servicemeshoperator3.v3.2.2" (CustomResourceDefinition "virtualservices.networking.istio.io"): unrecognized format "binary" 9m15s Warning AppliedWithWarnings installplan/install-gkvkm 1 warning(s) generated during installation of operator "servicemeshoperator3.v3.2.2" (CustomResourceDefinition "ztunnels.sailoperator.io"): sailoperator.io/v1alpha1 ZTunnel is deprecated; use sailoperator.io/v1 ZTunnel 8m27s Normal Scheduled pod/kiali-operator-7ffb966b85-bbk6x Successfully assigned openshift-operators/kiali-operator-7ffb966b85-bbk6x to ip-10-0-108-21.us-west-2.compute.internal 8m28s Normal AddedInterface pod/kiali-operator-7ffb966b85-bbk6x Add eth0 [10.129.2.12/23] from ovn-kubernetes 8m28s Normal Pulling pod/kiali-operator-7ffb966b85-bbk6x Pulling image "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:80527410292ccafbdc84527576e2fc1f9a0abd7154e2235f06de33f9861570ee" 8m1s Normal Pulled pod/kiali-operator-7ffb966b85-bbk6x Successfully pulled image "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:80527410292ccafbdc84527576e2fc1f9a0abd7154e2235f06de33f9861570ee" in 26.695s (26.695s including waiting). Image size: 756671885 bytes. 8m1s Normal Created pod/kiali-operator-7ffb966b85-bbk6x Created container: operator 8m1s Normal Started pod/kiali-operator-7ffb966b85-bbk6x Started container operator 8m28s Normal SuccessfulCreate replicaset/kiali-operator-7ffb966b85 Created pod: kiali-operator-7ffb966b85-bbk6x 8m28s Normal ScalingReplicaSet deployment/kiali-operator Scaled up replica set kiali-operator-7ffb966b85 from 0 to 1 8m29s Normal RequirementsUnknown clusterserviceversion/kiali-operator.v2.17.4 requirements not yet checked 8m28s Normal AllRequirementsMet clusterserviceversion/kiali-operator.v2.17.4 all requirements found, attempting install 8m28s Normal InstallSucceeded clusterserviceversion/kiali-operator.v2.17.4 waiting for install components to report healthy 8m28s Normal InstallWaiting clusterserviceversion/kiali-operator.v2.17.4 installing: waiting for deployment kiali-operator to become ready: deployment "kiali-operator" not available: Deployment does not have minimum availability. 7m28s Normal InstallSucceeded clusterserviceversion/kiali-operator.v2.17.4 install strategy completed with no errors 9m23s Normal LeaderElection lease/sail-operator-lock servicemesh-operator3-5968d78df4-v8tff_2d50cd66-95e2-43a8-af95-ffbd39ca8ae6 became leader 9m33s Normal Scheduled pod/servicemesh-operator3-5968d78df4-v8tff Successfully assigned openshift-operators/servicemesh-operator3-5968d78df4-v8tff to ip-10-0-108-21.us-west-2.compute.internal 9m33s Normal AddedInterface pod/servicemesh-operator3-5968d78df4-v8tff Add eth0 [10.129.2.10/23] from ovn-kubernetes 9m33s Normal Pulling pod/servicemesh-operator3-5968d78df4-v8tff Pulling image "registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:5d16c459a85c8f0580a8742911cd76b08f751f2600684cb0cad4acd13bc83743" 9m23s Normal Pulled pod/servicemesh-operator3-5968d78df4-v8tff Successfully pulled image "registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:5d16c459a85c8f0580a8742911cd76b08f751f2600684cb0cad4acd13bc83743" in 10.412s (10.412s including waiting). Image size: 170475461 bytes. 9m23s Normal Created pod/servicemesh-operator3-5968d78df4-v8tff Created container: sail-operator 9m23s Normal Started pod/servicemesh-operator3-5968d78df4-v8tff Started container sail-operator 9m34s Normal SuccessfulCreate replicaset/servicemesh-operator3-5968d78df4 Created pod: servicemesh-operator3-5968d78df4-v8tff 9m36s Warning ClusterIPNotAllocated service/servicemesh-operator3-metrics-service Cluster IP [IPv4]: 172.30.188.186 is not allocated; repairing 9m34s Normal ScalingReplicaSet deployment/servicemesh-operator3 Scaled up replica set servicemesh-operator3-5968d78df4 from 0 to 1 9m40s Normal RequirementsUnknown clusterserviceversion/servicemeshoperator3.v3.2.2 requirements not yet checked 9m38s Normal RequirementsNotMet clusterserviceversion/servicemeshoperator3.v3.2.2 one or more requirements couldn't be found 9m34s Normal AllRequirementsMet clusterserviceversion/servicemeshoperator3.v3.2.2 all requirements found, attempting install 9m34s Normal InstallSucceeded clusterserviceversion/servicemeshoperator3.v3.2.2 waiting for install components to report healthy 9m34s Normal InstallWaiting clusterserviceversion/servicemeshoperator3.v3.2.2 installing: waiting for deployment servicemesh-operator3 to become ready: deployment "servicemesh-operator3" not available: Deployment does not have minimum availability. 9m10s Normal InstallSucceeded clusterserviceversion/servicemeshoperator3.v3.2.2 install strategy completed with no errors =====Pods in openshift-operators=====: NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES kiali-operator-7ffb966b85-bbk6x 1/1 Running 0 8m28s 10.129.2.12 ip-10-0-108-21.us-west-2.compute.internal servicemesh-operator3-5968d78df4-v8tff 1/1 Running 0 9m34s 10.129.2.10 ip-10-0-108-21.us-west-2.compute.internal =====Operator Deployment describe=====: Name: servicemesh-operator3 Namespace: openshift-operators CreationTimestamp: Thu, 26 Feb 2026 04:13:13 +0000 Labels: app.kubernetes.io/component=sail-operator app.kubernetes.io/created-by=servicemeshoperator3 app.kubernetes.io/instance=servicemesh-operator3 app.kubernetes.io/managed-by=helm app.kubernetes.io/name=deployment app.kubernetes.io/part-of=servicemeshoperator3 control-plane=servicemesh-operator3 olm.deployment-spec-hash=buE8Ji5HzUIQCWGlISehVHZUQrs0h4LEEuvZb4 olm.managed=true olm.owner=servicemeshoperator3.v3.2.2 olm.owner.kind=ClusterServiceVersion olm.owner.namespace=openshift-operators operators.coreos.com/servicemeshoperator3.openshift-operators= Annotations: deployment.kubernetes.io/revision: 1 Selector: app.kubernetes.io/created-by=servicemeshoperator3,app.kubernetes.io/part-of=servicemeshoperator3,control-plane=servicemesh-operator3 Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable StrategyType: RollingUpdate MinReadySeconds: 0 RollingUpdateStrategy: 25% max unavailable, 25% max surge Pod Template: Labels: app.kubernetes.io/created-by=servicemeshoperator3 app.kubernetes.io/part-of=servicemeshoperator3 control-plane=servicemesh-operator3 Annotations: alm-examples: [ { "apiVersion": "sailoperator.io/v1", "kind": "Istio", "metadata": { "name": "default" }, "spec": { "namespace": "istio-system", "updateStrategy": { "inactiveRevisionDeletionGracePeriodSeconds": 30, "type": "InPlace" }, "version": "v1.27.5" } }, { "apiVersion": "sailoperator.io/v1", "kind": "IstioCNI", "metadata": { "name": "default" }, "spec": { "namespace": "istio-cni", "version": "v1.27.5" } }, { "apiVersion": "sailoperator.io/v1", "kind": "ZTunnel", "metadata": { "name": "default" }, "spec": { "namespace": "ztunnel", "version": "v1.27.3" } } ] capabilities: Seamless Upgrades categories: OpenShift Optional, Integration & Delivery, Networking, Security containerImage: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:5d16c459a85c8f0580a8742911cd76b08f751f2600684cb0cad4acd13bc83743 createdAt: 2026-01-27T14:22:23Z description: The OpenShift Service Mesh Operator enables you to install, configure, and manage an instance of Red Hat OpenShift Service Mesh. OpenShift... features.operators.openshift.io/cnf: false features.operators.openshift.io/cni: true features.operators.openshift.io/csi: false features.operators.openshift.io/disconnected: true features.operators.openshift.io/fips-compliant: true features.operators.openshift.io/proxy-aware: false features.operators.openshift.io/tls-profiles: false features.operators.openshift.io/token-auth-aws: false features.operators.openshift.io/token-auth-azure: false features.operators.openshift.io/token-auth-gcp: false images.v1_24_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2b60b0f33affda8b5b2cc30a4b09b2198b053fb1a914d386d35fcf03c09234e6 images.v1_24_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:a020acb4a74040df03077924e10465454092f6c34a902b391fba55563c08f826 images.v1_24_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:f592b91a6f28559abdf6546ff6c3ae70a44d8f811592746e9eb02cdb2e5dec9d images.v1_24_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:17db00a219de14e5901b5a5eca64d3c6684ca74c1dba3ae3b03787c655fe9c80 images.v1_24_4.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54cada48e5c9824f255f82daa2ef5bea236919e521d3ea49885f2883ced2b7bc images.v1_24_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:87b967785d7cc222f9df9cb49f0373a9819bf67910ce523dc3b8345849e881dd images.v1_24_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7fa655f5efb1175ff1e1c138371fc1233e5d4313c5feb07194428d0d1fdd33a3 images.v1_24_5.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:7ea9b82e192402566e69063a4787351be9f1ef50719bfd1a8f5d... images.v1_24_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:0183bcce17e39308d1ceb8f4e7a88923f037f738b342e9673406cc2c44b525ac images.v1_24_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:0d8d08879a9af334b1ebb345c58bbd395cbfa77646552485329919e3bd075465 images.v1_24_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:5e1509e1746653b00125c540258d0eed2397ff74745f2d4854ca7e27f0e109ed images.v1_24_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:adcd26b9b64462153973ea1103f1c23c68012af315d804705be9ad927c89f7ff images.v1_24_6.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:2514a14cdec51d4570bed5678624d9406539842607bc52bbc98f... images.v1_26_2.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:14c5a52faf20267baa43d9a72ee6416f56fbc41dd640adc2aba3c4043802a0e9 images.v1_26_2.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:028e10651db0d1ddb769a27c9483c6d41be6ac597f253afd9d599f395d9c82d8 images.v1_26_2.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:366266f10e658c4cea86bddf6ee847e1908ea4dd780cb5f7fb0e466bac8995f1 images.v1_26_2.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:d518f3d1539f45e1253c5c9fa22062802804601d4998cd50344e476a3cc388fe images.v1_26_2.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:ecc6a22a471f4f4b836648f3a72ea7f57a4ea960ebcbc7dbe3fe7295... images.v1_26_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2ea112ab90b8540f11e9949d77c3e7e3b3ef57ac3bf23f6cf1e883a88430e1f9 images.v1_26_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:33feac0c9c888b375e207e86b3f9a1a289126ca46b64632a7f693e2191cfbbfd images.v1_26_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:2ca96716812d339775d3dfd396c863834dd3810720e98bfcf87bc67c5fbd29b5 images.v1_26_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:26747627ae22bbdffcf9de58077454fc0c890cda83659d7834b15dea2b5aaaf2 images.v1_26_3.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f7ab868455b5e887e2d89b7078678531290365f9166cae99ce56119f... images.v1_26_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:9536c5850961488b3e01e29140d9ace0cbaa1f4bd1c1860cb49d10bf0514a5bf images.v1_26_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:02b82941a92c537233c4f60d9223da2e637b045189b8700dd7030bd9c1c352d5 images.v1_26_4.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:cadc30c15a54d89de1992624a3641c7d5951dd292b668d026ab9d5e2f3878a77 images.v1_26_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b45ecae5a9240b40403c4e39c6a81ab66c8c7e8de194dc3e21b1336ff3a0fa38 images.v1_26_4.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:950e9a2e8fef8740b4909957c2cced52d45abd66324fb056097f2d07... images.v1_26_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:be16b9a7e2693bf294c99d96ba4cf36e98629ebff2ce6f2ce946fd9ae1e9f2dc images.v1_26_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:91229b8d6e932178ddddf0b4878114b65c0451755919996239d1fe6285b644e8 images.v1_26_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:8a21e30593e51f2fd2e51d9ab1d0ed2fc43eaa9b98173d7fb74f799d6b2f163d images.v1_26_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:47100186c27934adeda3002bb04cac28980ca8854eee7d6e4f4b3f85562e9a8e images.v1_26_6.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f39e2c28ef36fce9f808f3946cc4e4126047e142ad84cb18c222cecc... images.v1_26_8.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:dd02b94ca8e81ad0d0177f187cc7e67a52d58856f92e92bc4a71ab3f3723fd1f images.v1_26_8.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:e59864113e84cdf5f14d93229af720a1a3ab85b6e2ece8e0477079ab62a14068 images.v1_26_8.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:d607fea2f3f03ba269b90fcaa53f1a0e696113236e125da5be142cbcf89ae4cf images.v1_26_8.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b17a2794ec7b94f5c67ac7b6b230b9a699d0eadef0bc35ede58b17df64aa26fc images.v1_26_8.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:9f7b28f8c92b59715f9e1d0b7b463ae870fab5899c2332c53542ec50... images.v1_27_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:ddadd677161ad8c1077dd156821d6b4e32742ccbb210e9c14696fa66a58c0867 images.v1_27_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:0850242436e88f7d82f0f2126de064c7e0f09844f31d8ff0f53dc8d3908075d9 images.v1_27_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:742bc084c26769ff57cb3aa47b7a35c2b94684c3f67a9388da07a0490a942e5c images.v1_27_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7d15cebf9b62f3f235c0eab5158ac8ff2fda86a1d193490dc94c301402c99da8 images.v1_27_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:b2b3216a05f6136ed9ddb71d72d493030c6d6b431682dddffa692c760b6c9ba1 images.v1_27_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2929b7df3da8228a728945542647ec5450c0585a2ed5cbdb84f8e3d81ab41806 images.v1_27_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:2e515a40de141bd4e516bfcf4fd0cbb8d236ac02799a7a35d77ae44f53916bc9 images.v1_27_5.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:d1baba8cb454b62d804dc427d4ccfea928348631c384d1ab3d170e1e2a9d1178 images.v1_27_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:650da1e2ad1cb93e6a0231dba7ca1f27f4cccac84e5925135281adc629a0caea images.v1_27_5.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:0ae2919cd446e0e1f0a21d0850e7809ba8f44c06d484c023b3bee2787ca4bdd0 kubectl.kubernetes.io/default-container: sail-operator olm.operatorGroup: global-operators olm.operatorNamespace: openshift-operators olm.targetNamespaces: operatorframework.io/properties: {"properties":[{"type":"olm.gvk","value":{"group":"extensions.istio.io","kind":"WasmPlugin","version":"v1alpha1"}},{"type":"olm.gvk","valu... operators.openshift.io/valid-subscription: ["OpenShift Container Platform", "OpenShift Platform Plus"] operators.operatorframework.io/builder: operator-sdk-v1.41.1 operators.operatorframework.io/internal-objects: ["wasmplugins.extensions.istio.io","destinationrules.networking.istio.io","envoyfilters.networking.istio.io","gateways.networking.istio.io... operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/istio-ecosystem/sail-operator support: Red Hat, Inc. Service Account: servicemesh-operator3 Containers: sail-operator: Image: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:5d16c459a85c8f0580a8742911cd76b08f751f2600684cb0cad4acd13bc83743 Port: Host Port: Command: /usr/local/bin/sail-operator Args: --health-probe-bind-address=:8081 --metrics-bind-address=:8443 --zap-log-level=info Limits: cpu: 500m memory: 1Gi Requests: cpu: 10m memory: 64Mi Liveness: http-get http://:8081/healthz delay=15s timeout=1s period=20s #success=1 #failure=3 Readiness: http-get http://:8081/readyz delay=5s timeout=1s period=10s #success=1 #failure=3 Environment: OPERATOR_CONDITION_NAME: servicemeshoperator3.v3.2.2 Mounts: /etc/sail-operator from operator-config (ro) Volumes: operator-config: Type: DownwardAPI (a volume populated by information about the pod) Items: metadata.annotations -> config.properties Node-Selectors: Tolerations: Conditions: Type Status Reason ---- ------ ------ Available True MinimumReplicasAvailable Progressing True NewReplicaSetAvailable OldReplicaSets: NewReplicaSet: servicemesh-operator3-5968d78df4 (1/1 replicas created) Events: Type Reason Age From Message ---- ------ ---- ---- ------- Normal ScalingReplicaSet 9m35s deployment-controller Scaled up replica set servicemesh-operator3-5968d78df4 from 0 to 1 ========================================================= =====Istio YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc get istio default -o yaml: Error from server (NotFound): istios.sailoperator.io "default" not found , output: Error from server (NotFound): istios.sailoperator.io "default" not found =====Pods in istio-system=====: =====Istiod logs=====: error executing command: /usr/bin/sh -c oc -n istio-system logs deploy/istiod --since=2m0s: error: error from server (NotFound): namespaces "istio-system" not found in namespace "istio-system" =====Events in istio-system=====: =====Istioctl Proxy Status=====: failed to get proxy status: error executing command: /usr/bin/sh -c /go/src/github.com/openshift-service-mesh/sail-operator/bin/istioctl proxy-status: Error: no running Istio pods in "istio-system" ========================================================= =====IstioCNI YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc get istiocni default -o yaml: Error from server (NotFound): istiocnis.sailoperator.io "default" not found , output: Error from server (NotFound): istiocnis.sailoperator.io "default" not found =====Istio CNI DaemonSet YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc -n istio-cni get daemonset istio-cni-node -o yaml: Error from server (NotFound): namespaces "istio-cni" not found , output: Error from server (NotFound): namespaces "istio-cni" not found =====Events in istio-cni=====: =====Pods in istio-cni=====: =====Istio CNI DaemonSet describe=====: error describing resource: error executing command: /usr/bin/sh -c oc -n istio-cni describe daemonset istio-cni-node: Error from server (NotFound): namespaces "istio-cni" not found , output: Error from server (NotFound): namespaces "istio-cni" not found =====Istio CNI logs=====: error executing command: /usr/bin/sh -c oc -n istio-cni logs daemonset/istio-cni-node --since=2m0s: error: error from server (NotFound): namespaces "istio-cni" not found in namespace "istio-cni" ========================================================= =====CA certs in istio-system=====: error getting secret: error executing command: /usr/bin/sh -c oc -n istio-system get secret cacerts -o yaml: Error from server (NotFound): namespaces "istio-system" not found , output Error from server (NotFound): namespaces "istio-system" not found ========================================================= =====Namespace sleep (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace sleep -o yaml: Error from server (NotFound): namespaces "sleep" not found , output: Error from server (NotFound): namespaces "sleep" not found =====Namespace httpbin (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace httpbin -o yaml: Error from server (NotFound): namespaces "httpbin" not found , output: Error from server (NotFound): namespaces "httpbin" not found ========================================================= =====ZTunnel YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc get ztunnel default -o yaml: Error from server (NotFound): ztunnels.sailoperator.io "default" not found , output: Error from server (NotFound): ztunnels.sailoperator.io "default" not found =====ZTunnel DaemonSet YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc -n ztunnel get daemonset ztunnel -o yaml: Error from server (NotFound): namespaces "ztunnel" not found , output: Error from server (NotFound): namespaces "ztunnel" not found =====Events in ztunnel=====: =====ZTunnel DaemonSet describe=====: error describing resource: error executing command: /usr/bin/sh -c oc -n ztunnel describe daemonset ztunnel: Error from server (NotFound): namespaces "ztunnel" not found , output: Error from server (NotFound): namespaces "ztunnel" not found =====ztunnel logs=====: error executing command: /usr/bin/sh -c oc -n ztunnel logs daemonset/ztunnel --since=2m0s: error: error from server (NotFound): namespaces "ztunnel" not found in namespace "ztunnel" =====sleep deployment describe=====: error describing resource: error executing command: /usr/bin/sh -c oc -n sleep describe deployment sleep: Error from server (NotFound): namespaces "sleep" not found , output: Error from server (NotFound): namespaces "sleep" not found =====httpbin deployment describe=====: error describing resource: error executing command: /usr/bin/sh -c oc -n httpbin describe deployment httpbin: Error from server (NotFound): namespaces "httpbin" not found , output: Error from server (NotFound): namespaces "httpbin" not found • [FAILED] [56.138 seconds] Ambient configuration for supported versions Istio version 1.26.8 when sample apps are deployed in the cluster [It] has the ztunnel proxy sockets configured in the pod network namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:244 [FAILED] Unexpected response from sleep-655b895c47-jptz9 pod Expected : Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name to contain substring : 15008 In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:331 @ 02/26/26 04:21:59.315 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.26.8 when sample apps are deployed in the cluster [It] can access the httpbin service from the sleep pod [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:248 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:248 @ 02/26/26 04:22:54.624 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.26.8 when the Istio CR is deleted [It] removes everything from the namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:259 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:259 @ 02/26/26 04:22:54.624 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.26.8 when the IstioCNI CR is deleted [It] removes everything from the CNI namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:273 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:273 @ 02/26/26 04:22:54.624 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.26.8 when the ZTunnel CR is deleted [It] removes everything from the ztunnel namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:288 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:288 @ 02/26/26 04:22:54.624 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when the IstioCNI CR is created with ambient profile [It] deploys the CNI DaemonSet [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:86 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:86 @ 02/26/26 04:22:54.624 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when the IstioCNI CR is created with ambient profile [It] uses the configured values in the istio-cni-config config map [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:96 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:96 @ 02/26/26 04:22:54.624 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when the Istio CR is created with ambient profile [It] updates the Istio CR status to Reconciled [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:121 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:121 @ 02/26/26 04:22:54.624 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when the Istio CR is created with ambient profile [It] updates the Istio CR status to Ready [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:127 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:127 @ 02/26/26 04:22:54.625 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when the Istio CR is created with ambient profile [It] deploys istiod [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:133 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:133 @ 02/26/26 04:22:54.625 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when the Istio CR is created with ambient profile [It] uses the correct image [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:140 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:140 @ 02/26/26 04:22:54.625 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when the Istio CR is created with ambient profile [It] has istiod with appropriate env variables set [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:145 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:145 @ 02/26/26 04:22:54.625 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when the ZTunnel CR is created [It] deploys the ZTunnel DaemonSet [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:183 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:183 @ 02/26/26 04:22:54.625 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when the ZTunnel CR is created [It] has ztunnel running with appropriate env variables set [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:194 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:194 @ 02/26/26 04:22:54.625 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when sample apps are deployed in the cluster [It] updates the status of pods to Running [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:236 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:236 @ 02/26/26 04:22:54.625 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when sample apps are deployed in the cluster [It] has the ztunnel proxy sockets configured in the pod network namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:244 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:244 @ 02/26/26 04:22:54.625 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when sample apps are deployed in the cluster [It] can access the httpbin service from the sleep pod [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:248 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:248 @ 02/26/26 04:22:54.625 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when the Istio CR is deleted [It] removes everything from the namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:259 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:259 @ 02/26/26 04:22:54.625 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when the IstioCNI CR is deleted [It] removes everything from the CNI namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:273 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:273 @ 02/26/26 04:22:54.625 ------------------------------ S [SKIPPED] [0.000 seconds] Ambient configuration for supported versions Istio version 1.24.6 when the ZTunnel CR is deleted [It] removes everything from the ztunnel namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:288 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:288 @ 02/26/26 04:22:54.625 ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.004 seconds] ------------------------------ Summarizing 1 Failure: [FAIL] Ambient configuration for supported versions Istio version 1.26.8 when sample apps are deployed in the cluster [It] has the ztunnel proxy sockets configured in the pod network namespace [smoke, ambient] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient/ambient_test.go:331 Ran 26 of 45 Specs in 190.000 seconds FAIL! -- 25 Passed | 1 Failed | 0 Pending | 19 Skipped --- FAIL: TestAmbient (190.02s) FAIL 2026-02-26T04:22:54.640162Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Cert Manager Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager ======================================================================================================================= Random Seed: 1772079557 Will run 0 of 18 specs SSSSSSSSSSSSSSSSSS ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.001 seconds] ------------------------------ Ran 0 of 18 Specs in 0.000 seconds SUCCESS! -- 0 Passed | 0 Failed | 0 Pending | 18 Skipped PASS 2026-02-26T04:22:54.661996Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Control Plane Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane ======================================================================================================================== Random Seed: 1772079557 Will run 47 of 59 specs SSSSSSSSSSSS ------------------------------ Control Plane Installation defaulting IstioCNI no spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:51 * IstioCNI created • [0.775 seconds] ------------------------------ Control Plane Installation defaulting IstioCNI empty spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:52 * IstioCNI created • [0.431 seconds] ------------------------------ Control Plane Installation defaulting Istio no spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:74 * Istio created • [0.439 seconds] ------------------------------ Control Plane Installation defaulting Istio empty spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:75 * Istio created • [0.434 seconds] ------------------------------ Control Plane Installation defaulting Istio empty updateStrategy [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:76 * Istio created • [0.432 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.5 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [15.473 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.059 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.058 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.059 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [30.690 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.27.5 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.382 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [3.235 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [1.030 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.059 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [29.251 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [19.280 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.882 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [2.732 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.5 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 02/26/26 04:24:45.292 STEP: Cleaning up the istio-system Namespace @ 02/26/26 04:24:45.352 STEP: Cleaning up the sample Namespace @ 02/26/26 04:24:45.414 STEP: Waiting for resources to be deleted @ 02/26/26 04:24:45.474 * Finished cleaning up resources • [15.773 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.26.8 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [15.442 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.058 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.057 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.057 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [30.715 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.26.8 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.378 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [2.176 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [1.045 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.057 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [30.713 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [20.168 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.877 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [2.744 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.8 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 02/26/26 04:26:46.479 STEP: Cleaning up the istio-system Namespace @ 02/26/26 04:26:46.541 STEP: Cleaning up the sample Namespace @ 02/26/26 04:26:46.602 STEP: Waiting for resources to be deleted @ 02/26/26 04:26:46.665 * Finished cleaning up resources • [31.897 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.24.6 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [20.840 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.057 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.058 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.058 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [30.505 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.24.6 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.372 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [14.881 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [1.026 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.057 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [30.668 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [11.721 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.880 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [2.725 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 02/26/26 04:29:13.232 STEP: Cleaning up the istio-system Namespace @ 02/26/26 04:29:13.294 STEP: Cleaning up the sample Namespace @ 02/26/26 04:29:13.356 STEP: Waiting for resources to be deleted @ 02/26/26 04:29:13.421 * Finished cleaning up resources • [31.505 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.004 seconds] ------------------------------ Ran 47 of 59 Specs in 406.215 seconds SUCCESS! -- 47 Passed | 0 Failed | 0 Pending | 12 Skipped PASS 2026-02-26T04:29:40.909865Z info loading supported istio versions from versions.ossm.yaml PASS 2026-02-26T04:29:40.931233Z info loading supported istio versions from versions.ossm.yaml PASS 2026-02-26T04:29:40.951316Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Multiple Control Planes Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane ======================================================================================================================================= Random Seed: 1772079557 Will run 42 of 42 specs ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [3.803 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.5 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [3.503 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.548 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.548 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [2.184 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [8.521 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [2.516 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [2.454 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [2.487 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [8.583 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [5.405 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.116 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.912 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.5 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 02/26/26 04:30:24.396 STEP: Cleaning up the mesh1 IstioRevision @ 02/26/26 04:30:24.53 STEP: Cleaning up the mesh2 IstioRevision @ 02/26/26 04:30:24.606 STEP: Cleaning up the mesh1 Istio @ 02/26/26 04:30:24.805 STEP: Cleaning up the mesh2 Istio @ 02/26/26 04:30:24.868 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 02/26/26 04:30:24.997 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 02/26/26 04:30:25.06 STEP: Waiting for resources to be deleted @ 02/26/26 04:30:25.85 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 02/26/26 04:30:26.55 STEP: Cleaning up the app2a Namespace @ 02/26/26 04:30:26.612 STEP: Cleaning up the app2b Namespace @ 02/26/26 04:30:26.676 STEP: Cleaning up the istio-cni Namespace @ 02/26/26 04:30:26.738 STEP: Cleaning up the istio-system1 Namespace @ 02/26/26 04:30:26.799 STEP: Cleaning up the istio-system2 Namespace @ 02/26/26 04:30:26.861 STEP: Waiting for resources to be deleted @ 02/26/26 04:30:26.922 * Finished cleaning up resources • [18.660 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [3.399 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.5 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [4.579 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.571 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.532 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [2.179 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [9.590 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [2.548 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [2.533 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [2.522 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [0.118 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [3.293 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [5.412 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.915 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.8 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 02/26/26 04:31:21.265 STEP: Cleaning up the mesh1 IstioRevision @ 02/26/26 04:31:21.426 STEP: Cleaning up the mesh2 IstioRevision @ 02/26/26 04:31:21.49 STEP: Cleaning up the mesh1 Istio @ 02/26/26 04:31:21.683 STEP: Cleaning up the mesh2 Istio @ 02/26/26 04:31:21.745 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 02/26/26 04:31:21.87 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 02/26/26 04:31:21.932 STEP: Waiting for resources to be deleted @ 02/26/26 04:31:22.619 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 02/26/26 04:31:23.523 STEP: Cleaning up the app2a Namespace @ 02/26/26 04:31:23.585 STEP: Cleaning up the app2b Namespace @ 02/26/26 04:31:23.646 STEP: Cleaning up the istio-cni Namespace @ 02/26/26 04:31:23.708 STEP: Cleaning up the istio-system1 Namespace @ 02/26/26 04:31:23.769 STEP: Cleaning up the istio-system2 Namespace @ 02/26/26 04:31:23.831 STEP: Waiting for resources to be deleted @ 02/26/26 04:31:23.895 * Finished cleaning up resources • [33.586 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [3.203 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.5 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [3.502 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.525 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.557 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [2.176 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [19.120 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [2.617 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [2.479 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [2.596 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [0.116 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [6.473 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.117 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.907 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 02/26/26 04:32:39.272 STEP: Cleaning up the mesh1 IstioRevision @ 02/26/26 04:32:39.394 STEP: Cleaning up the mesh2 IstioRevision @ 02/26/26 04:32:39.497 STEP: Cleaning up the mesh1 Istio @ 02/26/26 04:32:39.715 STEP: Cleaning up the mesh2 Istio @ 02/26/26 04:32:39.788 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 02/26/26 04:32:39.921 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 02/26/26 04:32:40.055 STEP: Waiting for resources to be deleted @ 02/26/26 04:32:40.741 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 02/26/26 04:32:41.644 STEP: Cleaning up the app2a Namespace @ 02/26/26 04:32:41.706 STEP: Cleaning up the app2b Namespace @ 02/26/26 04:32:41.769 STEP: Cleaning up the istio-cni Namespace @ 02/26/26 04:32:41.83 STEP: Cleaning up the istio-system1 Namespace @ 02/26/26 04:32:41.893 STEP: Cleaning up the istio-system2 Namespace @ 02/26/26 04:32:41.957 STEP: Waiting for resources to be deleted @ 02/26/26 04:32:42.02 * Finished cleaning up resources • [33.727 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.003 seconds] ------------------------------ Ran 42 of 42 Specs in 210.138 seconds SUCCESS! -- 42 Passed | 0 Failed | 0 Pending | 0 Skipped PASS ************ Running Setup ************ Initializing k8s client Running Suite: Operator Installation Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator ============================================================================================================================ Random Seed: 1772079557 Will run 5 of 5 specs ------------------------------ Operator installation deploys all the CRDs [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:69 * Istio CRDs are present • [2.671 seconds] ------------------------------ Operator installation updates the CRDs status to Established [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:76 * CRDs are Established • [1.261 seconds] ------------------------------ Operator installation istio crd is present [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:84 * Istio CRD is present • [0.224 seconds] ------------------------------ Operator installation starts successfully [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:91 • [0.059 seconds] ------------------------------ Operator installation serves metrics securely [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:96 STEP: creating a ClusterRoleBinding for the service account to allow access to metrics @ 02/26/26 04:33:15.348 STEP: validating that the metrics service is available @ 02/26/26 04:33:15.617 STEP: getting the service account token @ 02/26/26 04:33:15.884 STEP: waiting for the metrics endpoint to be ready @ 02/26/26 04:33:16.105 STEP: verifying that the controller manager is serving the metrics server @ 02/26/26 04:33:16.368 STEP: creating the curl-metrics namespace @ 02/26/26 04:33:16.928 STEP: creating the curl-metrics pod to access the metrics endpoint @ 02/26/26 04:33:17.187 STEP: waiting for the curl-metrics pod to complete. @ 02/26/26 04:33:17.452 STEP: getting the metrics by checking curl-metrics logs @ 02/26/26 04:33:23.807 STEP: getting the curl-metrics logs @ 02/26/26 04:33:23.807 STEP: Cleaning up the curl-metrics Namespace @ 02/26/26 04:33:26.24 STEP: Cleaning up the metrics-reader-rolebinding ClusterRoleBinding @ 02/26/26 04:33:26.3 STEP: Waiting for resources to be deleted @ 02/26/26 04:33:26.36 * Finished cleaning up resources • [17.211 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.001 seconds] ------------------------------ Ran 5 of 5 Specs in 21.426 seconds SUCCESS! -- 5 Passed | 0 Failed | 0 Pending | 0 Skipped PASS Could not open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/dualstack/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/dualstack/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: no such file or directory Could not open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicluster/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicluster/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: no such file or directory Ginkgo ran 7 suites in 14m14.740173377s There were failures detected in the following suites: ambient ./tests/e2e/ambient Test Suite Failed exit status 1 JUnit report: /go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml make: *** [Makefile.core.mk:223: test.e2e.ocp] Error 1 Patching Tests Result File: /logs/artifacts/junit-sail-e2e.xml Checking if yq exists yq version: yq (https://github.com/mikefarah/yq/) version v4.45.4 Mapping Test Suite Name To: ServiceMesh-lp-interop